Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
Analysis ID:1427743
MD5:f4babeed860c7952cb00bae31c4bfa54
SHA1:c818efd3d709df2baa44767b1332bb2df045f7a8
SHA256:ef171f71804fe96bf375379c691e1f93b3fe38a3535b24f8f19d104e5eecf7aa
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x316bd:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3172f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x317b9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3184b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x318b5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31927:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x319bd:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31a4d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 10 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.219.149, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, Initiated: true, ProcessId: 2136, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49709
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeAvira: detected
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeVirustotal: Detection: 35%Perma Link
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49708 version: TLS 1.2
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 4x nop then jmp 078C3330h0_2_078C37D3
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 50.87.219.149:587
                    Source: Joe Sandbox ViewIP Address: 50.87.219.149 50.87.219.149
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 50.87.219.149:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.ipify.org
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.alkuwaiti.com
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49708 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, oAKy.cs.Net Code: CHgRvKS

                    System Summary

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, Resources.csLarge array initialization: : array initializer size 630549
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_057715380_2_05771538
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074200400_2_07420040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07423F980_2_07423F98
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07420EF00_2_07420EF0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07423C800_2_07423C80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074232400_2_07423240
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074261480_2_07426148
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074261580_2_07426158
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074281770_2_07428177
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074281000_2_07428100
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074200060_2_07420006
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074230080_2_07423008
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_0742F0100_2_0742F010
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_0742F0200_2_0742F020
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_074280F00_2_074280F0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07422FF80_2_07422FF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07423F890_2_07423F89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07424E400_2_07424E40
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07420EB90_2_07420EB9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07421DD90_2_07421DD9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07421DE00_2_07421DE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07423C700_2_07423C70
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07422C890_2_07422C89
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07422C980_2_07422C98
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_0742EBD00_2_0742EBD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_0742EBE80_2_0742EBE8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_078C0C500_2_078C0C50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_078C02A00_2_078C02A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_078C11480_2_078C1148
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_0139E6A93_2_0139E6A9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_01394AA03_2_01394AA0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_01393E883_2_01393E88
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_013941D03_2_013941D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069EA0683_2_069EA068
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F55983_2_069F5598
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F65E83_2_069F65E8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069FB2303_2_069FB230
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F30483_2_069F3048
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069FC1983_2_069FC198
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F7D783_2_069F7D78
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F76983_2_069F7698
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069FE3B03_2_069FE3B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F00403_2_069F0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F5CE53_2_069F5CE5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F00063_2_069F0006
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069F05563_2_069F0556
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004AA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4548b61d-822f-464b-a714-a9778dc216a9.exe4 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2071632145.000000000B5D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2065404021.000000000112E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066200681.00000000030C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2070374607.0000000005C50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSimpleLogin.dll8 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066200681.00000000033E6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename4548b61d-822f-464b-a714-a9778dc216a9.exe4 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename4548b61d-822f-464b-a714-a9778dc216a9.exe4 vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260362205.0000000000BB8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeBinary or memory string: OriginalFilenamekugR.exe< vs SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, ekKu0.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, vKf1z6NvS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, ZNAvlD7qmXc.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, U2doU2.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, BgffYko.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, HrTdA63.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, Vvp22TrBv9g.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, ObjHrafHCDPkxn9Q6W.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, ObjHrafHCDPkxn9Q6W.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, WnXetM0ArtAll2FBvV.csSecurity API names: _0020.AddAccessRule
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMutant created: \Sessions\1\BaseNamedObjects\vGcGFBmZoGZOceLrZDVsRB
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeVirustotal: Detection: 35%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe:Zone.IdentifierJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, WnXetM0ArtAll2FBvV.cs.Net Code: oYn81KEEoR System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, WnXetM0ArtAll2FBvV.cs.Net Code: oYn81KEEoR System.Reflection.Assembly.Load(byte[])
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_056D226C push ebx; ret 0_2_056D226D
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_01393405 pushfd ; iretd 0_2_01393409
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_01393EF7 push ebp; ret 0_2_01393EF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_07420947 pushad ; retf 0_2_07420948
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_0742093D pushad ; retf 0_2_0742093E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 0_2_078C6B75 push FFFFFF8Bh; iretd 0_2_078C6B77
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_01390C3D push edi; ret 3_2_01390CC2
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_01390C95 push edi; retf 3_2_01390C3A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeCode function: 3_2_069EFCBC push es; retf 3_2_069EFCC8
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeStatic PE information: section name: .text entropy: 7.9719974623886785
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, W2oVZw8noIZNLftIfT.csHigh entropy of concatenated method names: 'QkLBsbjHra', 'uCDB0Pkxn9', 'i0IB3PMWXZ', 's7qBaXQm3S', 'T8jBloPT0H', 'AW9Bg877m5', 'DZTt2it8lpvyWaVGYq', 'X9W0kXz5JWYCiCxc7x', 'pIZBBbsjYL', 'WGABrIBIq9'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, XCK07T4CvUPZ0LZ4VF.csHigh entropy of concatenated method names: 'OlcR3NNpMn', 'Mu7Rab8voC', 'ToString', 'pA2RA5EfKQ', 'GT5RJsYJDr', 'VYWRxva6XA', 'lx0RFhDMnZ', 'XsIRIw2Tto', 'qGQRsXO3OA', 'zUsR0JocYU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, pWUE6OJ8yOYNGaosMc.csHigh entropy of concatenated method names: 'Dispose', 'NvyBe8vpp7', 'W0NVX5o26A', 'fN9NNYHfAI', 'E61B2OyUpp', 'KrJBzm2V3h', 'ProcessDialogKey', 'WWBVGV8exN', 'QU6VBy0aXr', 'WByVVlaaP5'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, FgKc7VNucluUqd2h2R.csHigh entropy of concatenated method names: 'V4SRUh4kVF', 'JsuR2P5uVR', 'XHqSGJhNCB', 'SYrSBFKBij', 't8GRWFq37r', 'GkeRdYxFfn', 'tINR7oZ1hx', 'GGFRTdLWCX', 'YSAROTGN69', 'e8qRtp9YVf'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, WnXetM0ArtAll2FBvV.csHigh entropy of concatenated method names: 'GLOrjUs5qy', 'dZ7rAtnrsY', 'uSXrJdNmwT', 'uWJrxZhs63', 'GtgrFTMAFH', 'b0lrIal51v', 'nLCrsVpwA2', 'TRtr0it6Rr', 'P9yrovfMNu', 'SCqr3MVidQ'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, ObjHrafHCDPkxn9Q6W.csHigh entropy of concatenated method names: 'zsVJTdifkd', 'K2gJOAdnMc', 'uSrJt5dmgd', 'vCUJ4ex3ve', 'zNFJqbv3lo', 'PMVJNUBZ4O', 'O1QJbvQtPQ', 'qNqJU7sY5K', 'foGJeaX7rX', 'LVsJ2gL0VO'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, DmCcKFK0IPMWXZ97qX.csHigh entropy of concatenated method names: 'al2xcBZ7MT', 'xoaxvUucVx', 'IoQxflrdhn', 'AgpxKlGV1W', 'mHMxlaG0BJ', 'sCuxgQjHqH', 'WadxRxdIga', 'm88xSB5NlU', 'Ao8x972V01', 'SrXxZQCVOy'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, Q0HcW9D877m5eI86a7.csHigh entropy of concatenated method names: 'n9yIjFtbF4', 'iWTIJfrXuB', 'rHAIFyS4jK', 'AkKIsuABCr', 'oLjI0GduIk', 'seIFq89eLe', 'wXNFN8RFMX', 'hiQFbdbGpa', 'uj7FUCL17V', 'IwvFevvhXj'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, paaP5t23Wf5EZKU9I1.csHigh entropy of concatenated method names: 'wob9BhJf1i', 'pJw9rFO3G3', 'HbK98laKRd', 'ujP9AXcy6E', 'CAJ9J2bKvk', 'qxV9FuSymu', 'eRi9IKJdrT', 'QhbSbn4y0M', 'vLrSUmOLqs', 'CQhSeykZUp'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, SqDhCdBVqkPc7mcoojn.csHigh entropy of concatenated method names: 'S4vZP5rYfp', 'KliZhU151x', 'qCFZ16yeRl', 'wCkBN6RRbTy548C4HZf', 'kekOPURIjnk4AL3lYZO', 'GmCyYJRB7JptnivsnT6', 'KS27VdR7iTl4mxhD9gX', 'UNItjdRrjg2MXlyONrE'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, O3F0AYw1NXJKpFIM2X.csHigh entropy of concatenated method names: 'NtxsPGo2nG', 'ioNshXluY0', 'HOrs1VDWih', 'uPusc7k6lv', 'rQ1s52q8dR', 'PfLsvh9yDL', 'RwWsukrRTd', 'QKisfNsOQD', 'zB2sKSgo92', 'pvNsYslBjN'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, YcY1VjVQsRwIGoEksb.csHigh entropy of concatenated method names: 'aj41NE1Uv', 'XNncHpQkc', 'eGTvvMIHZ', 'a90ujNB2O', 'tsdKqnSI8', 'JRcYVJkPP', 'L4KStwn6wglDAD01JG', 'JXjkWB5wDn4bQPBmdy', 'TeQSHTDA6', 'J77ZjevBX'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, aNIa7szEoxQuTqJ4CQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'I0k96i8lc8', 'OZV9lQA20G', 'JoV9gjufDV', 'L6J9ROy66e', 'eUf9SwMd1J', 'YPW99dIgur', 'fox9ZylwBh'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, O3x211BGWSnFU7J8LK4.csHigh entropy of concatenated method names: 'WKY9P8vO37', 'hjR9hJuU2i', 'Ayl91FNJTK', 'Rlm9c934lt', 'dLV95tIg4a', 'qvS9vuCivf', 'ER99uHph47', 'Bof9fvo0BW', 'GRA9Kc6oHA', 'gAQ9YjQPZF'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, Im3SNUYA4OoAs48joP.csHigh entropy of concatenated method names: 'MGdF5BkT0b', 'fQxFuFuJ5C', 'dJTxn2fHdV', 'lD7xQHLDkv', 'dBdxk4AFrG', 'PqgxC32WAH', 'hxmxp0cUM3', 'rvoxmyHSi2', 'TAZxwCKAv5', 'gVhxLQn1GY'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, bV8exNe7U6y0aXrbBy.csHigh entropy of concatenated method names: 'm7ASDQH0pw', 'o6HSXBgBK1', 'k4kSnJU4DN', 'fOsSQhx5Ob', 'xeOSToXobr', 'jOSSkZfUVI', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, fxVcsY7ME09f7oRmwm.csHigh entropy of concatenated method names: 'Wxp6fQ0mPT', 'uoc6KwsXTy', 'Fy26D5V4Z4', 'pcj6XO2ZAQ', 'mlq6QQM1AI', 'LvP6kMWtFT', 'MPI6p8NxjY', 'ItA6mGtmNF', 'CV46L7Zxoq', 'may6WSQ0OZ'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, LEBdxRTMrnSpatktya.csHigh entropy of concatenated method names: 'dPjlLHl2tc', 'v6oldqAcd7', 'qrulTdRZZp', 'oPKlODne83', 'q4ilXOhCx4', 'X8ilnAm2id', 'ub4lQH9dkc', 'FnGlkQYrUW', 'F1MlC5RW1n', 'Vnslp1ahfU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, o1OyUpUpCrJm2V3hUW.csHigh entropy of concatenated method names: 'CZDSAo8vEb', 'yVaSJhIpX4', 'NbqSxEnSoi', 'qGGSFmwqS4', 'rtlSIwRkyL', 'hAHSsLgY7f', 'WL7S040oIt', 'RY3SoMECZR', 'ie3S3oNTbk', 'HTPSamPsiY'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, T2S5hSBrc8XPGFgEnTS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wIMZTAYXRG', 'S6YZOxM0vT', 'RAbZt4T0ag', 'sV9Z4IwrT5', 'WNkZqbImeN', 'WdQZN7id9k', 'erbZbwHNQU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4d2a400.4.raw.unpack, fYfX8Xp3pcvd29DGCX.csHigh entropy of concatenated method names: 'MFYsALOKMv', 'ypisxXb8sH', 'LcrsIcn8XH', 'bwjI2Vf5No', 'k12IzN1e9h', 'h3csGUtdRm', 'ii7sBQIU7C', 'jvWsVS65Xp', 'aaksrv57eN', 'ehis8LY5Jx'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, W2oVZw8noIZNLftIfT.csHigh entropy of concatenated method names: 'QkLBsbjHra', 'uCDB0Pkxn9', 'i0IB3PMWXZ', 's7qBaXQm3S', 'T8jBloPT0H', 'AW9Bg877m5', 'DZTt2it8lpvyWaVGYq', 'X9W0kXz5JWYCiCxc7x', 'pIZBBbsjYL', 'WGABrIBIq9'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, XCK07T4CvUPZ0LZ4VF.csHigh entropy of concatenated method names: 'OlcR3NNpMn', 'Mu7Rab8voC', 'ToString', 'pA2RA5EfKQ', 'GT5RJsYJDr', 'VYWRxva6XA', 'lx0RFhDMnZ', 'XsIRIw2Tto', 'qGQRsXO3OA', 'zUsR0JocYU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, pWUE6OJ8yOYNGaosMc.csHigh entropy of concatenated method names: 'Dispose', 'NvyBe8vpp7', 'W0NVX5o26A', 'fN9NNYHfAI', 'E61B2OyUpp', 'KrJBzm2V3h', 'ProcessDialogKey', 'WWBVGV8exN', 'QU6VBy0aXr', 'WByVVlaaP5'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, FgKc7VNucluUqd2h2R.csHigh entropy of concatenated method names: 'V4SRUh4kVF', 'JsuR2P5uVR', 'XHqSGJhNCB', 'SYrSBFKBij', 't8GRWFq37r', 'GkeRdYxFfn', 'tINR7oZ1hx', 'GGFRTdLWCX', 'YSAROTGN69', 'e8qRtp9YVf'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, WnXetM0ArtAll2FBvV.csHigh entropy of concatenated method names: 'GLOrjUs5qy', 'dZ7rAtnrsY', 'uSXrJdNmwT', 'uWJrxZhs63', 'GtgrFTMAFH', 'b0lrIal51v', 'nLCrsVpwA2', 'TRtr0it6Rr', 'P9yrovfMNu', 'SCqr3MVidQ'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, ObjHrafHCDPkxn9Q6W.csHigh entropy of concatenated method names: 'zsVJTdifkd', 'K2gJOAdnMc', 'uSrJt5dmgd', 'vCUJ4ex3ve', 'zNFJqbv3lo', 'PMVJNUBZ4O', 'O1QJbvQtPQ', 'qNqJU7sY5K', 'foGJeaX7rX', 'LVsJ2gL0VO'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, DmCcKFK0IPMWXZ97qX.csHigh entropy of concatenated method names: 'al2xcBZ7MT', 'xoaxvUucVx', 'IoQxflrdhn', 'AgpxKlGV1W', 'mHMxlaG0BJ', 'sCuxgQjHqH', 'WadxRxdIga', 'm88xSB5NlU', 'Ao8x972V01', 'SrXxZQCVOy'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, Q0HcW9D877m5eI86a7.csHigh entropy of concatenated method names: 'n9yIjFtbF4', 'iWTIJfrXuB', 'rHAIFyS4jK', 'AkKIsuABCr', 'oLjI0GduIk', 'seIFq89eLe', 'wXNFN8RFMX', 'hiQFbdbGpa', 'uj7FUCL17V', 'IwvFevvhXj'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, paaP5t23Wf5EZKU9I1.csHigh entropy of concatenated method names: 'wob9BhJf1i', 'pJw9rFO3G3', 'HbK98laKRd', 'ujP9AXcy6E', 'CAJ9J2bKvk', 'qxV9FuSymu', 'eRi9IKJdrT', 'QhbSbn4y0M', 'vLrSUmOLqs', 'CQhSeykZUp'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, SqDhCdBVqkPc7mcoojn.csHigh entropy of concatenated method names: 'S4vZP5rYfp', 'KliZhU151x', 'qCFZ16yeRl', 'wCkBN6RRbTy548C4HZf', 'kekOPURIjnk4AL3lYZO', 'GmCyYJRB7JptnivsnT6', 'KS27VdR7iTl4mxhD9gX', 'UNItjdRrjg2MXlyONrE'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, O3F0AYw1NXJKpFIM2X.csHigh entropy of concatenated method names: 'NtxsPGo2nG', 'ioNshXluY0', 'HOrs1VDWih', 'uPusc7k6lv', 'rQ1s52q8dR', 'PfLsvh9yDL', 'RwWsukrRTd', 'QKisfNsOQD', 'zB2sKSgo92', 'pvNsYslBjN'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, YcY1VjVQsRwIGoEksb.csHigh entropy of concatenated method names: 'aj41NE1Uv', 'XNncHpQkc', 'eGTvvMIHZ', 'a90ujNB2O', 'tsdKqnSI8', 'JRcYVJkPP', 'L4KStwn6wglDAD01JG', 'JXjkWB5wDn4bQPBmdy', 'TeQSHTDA6', 'J77ZjevBX'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, aNIa7szEoxQuTqJ4CQ.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'I0k96i8lc8', 'OZV9lQA20G', 'JoV9gjufDV', 'L6J9ROy66e', 'eUf9SwMd1J', 'YPW99dIgur', 'fox9ZylwBh'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, O3x211BGWSnFU7J8LK4.csHigh entropy of concatenated method names: 'WKY9P8vO37', 'hjR9hJuU2i', 'Ayl91FNJTK', 'Rlm9c934lt', 'dLV95tIg4a', 'qvS9vuCivf', 'ER99uHph47', 'Bof9fvo0BW', 'GRA9Kc6oHA', 'gAQ9YjQPZF'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, Im3SNUYA4OoAs48joP.csHigh entropy of concatenated method names: 'MGdF5BkT0b', 'fQxFuFuJ5C', 'dJTxn2fHdV', 'lD7xQHLDkv', 'dBdxk4AFrG', 'PqgxC32WAH', 'hxmxp0cUM3', 'rvoxmyHSi2', 'TAZxwCKAv5', 'gVhxLQn1GY'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, bV8exNe7U6y0aXrbBy.csHigh entropy of concatenated method names: 'm7ASDQH0pw', 'o6HSXBgBK1', 'k4kSnJU4DN', 'fOsSQhx5Ob', 'xeOSToXobr', 'jOSSkZfUVI', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, fxVcsY7ME09f7oRmwm.csHigh entropy of concatenated method names: 'Wxp6fQ0mPT', 'uoc6KwsXTy', 'Fy26D5V4Z4', 'pcj6XO2ZAQ', 'mlq6QQM1AI', 'LvP6kMWtFT', 'MPI6p8NxjY', 'ItA6mGtmNF', 'CV46L7Zxoq', 'may6WSQ0OZ'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, LEBdxRTMrnSpatktya.csHigh entropy of concatenated method names: 'dPjlLHl2tc', 'v6oldqAcd7', 'qrulTdRZZp', 'oPKlODne83', 'q4ilXOhCx4', 'X8ilnAm2id', 'ub4lQH9dkc', 'FnGlkQYrUW', 'F1MlC5RW1n', 'Vnslp1ahfU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, o1OyUpUpCrJm2V3hUW.csHigh entropy of concatenated method names: 'CZDSAo8vEb', 'yVaSJhIpX4', 'NbqSxEnSoi', 'qGGSFmwqS4', 'rtlSIwRkyL', 'hAHSsLgY7f', 'WL7S040oIt', 'RY3SoMECZR', 'ie3S3oNTbk', 'HTPSamPsiY'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, T2S5hSBrc8XPGFgEnTS.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wIMZTAYXRG', 'S6YZOxM0vT', 'RAbZt4T0ag', 'sV9Z4IwrT5', 'WNkZqbImeN', 'WdQZN7id9k', 'erbZbwHNQU'
                    Source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.b5d0000.9.raw.unpack, fYfX8Xp3pcvd29DGCX.csHigh entropy of concatenated method names: 'MFYsALOKMv', 'ypisxXb8sH', 'LcrsIcn8XH', 'bwjI2Vf5No', 'k12IzN1e9h', 'h3csGUtdRm', 'ii7sBQIU7C', 'jvWsVS65Xp', 'aaksrv57eN', 'ehis8LY5Jx'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 1350000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 9040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 7570000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: A040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: B040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: B650000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: C650000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: D650000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: 13B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWindow / User API: threadDelayed 3705Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWindow / User API: threadDelayed 1565Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 7164Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 6340Thread sleep count: 3705 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 6340Thread sleep count: 1565 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -99000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98866s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98422s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98313s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98188s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -98063s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97938s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97813s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97250s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -97129s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe TID: 1976Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 99000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98866Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98750Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98640Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98531Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98422Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98313Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 98063Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97938Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97813Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97250Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 97129Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 5860, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 2136, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 5860, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 2136, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e3f058.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe.4e04638.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 5860, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe PID: 2136, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS111
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe35%VirustotalBrowse
                    SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe100%AviraHEUR/AGEN.1310026
                    SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    mail.alkuwaiti.com0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://r3.o.lencr.org00%URL Reputationsafe
                    http://x1.c.lencr.org/00%URL Reputationsafe
                    http://x1.i.lencr.org/00%URL Reputationsafe
                    http://r3.i.lencr.org/00%URL Reputationsafe
                    http://mail.alkuwaiti.com0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.alkuwaiti.com
                    50.87.219.149
                    truefalseunknown
                    api.ipify.org
                    104.26.13.205
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://mail.alkuwaiti.comSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        http://r3.o.lencr.org0SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ipify.orgSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://account.dyn.com/SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org/tSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://x1.c.lencr.org/0SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://x1.i.lencr.org/0SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://r3.i.lencr.org/0SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000000FE2000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3260615126.0000000001005000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3261100936.0000000001039000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe, 00000003.00000002.3265792695.0000000006789000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                50.87.219.149
                                mail.alkuwaiti.comUnited States
                                46606UNIFIEDLAYER-AS-1USfalse
                                104.26.13.205
                                api.ipify.orgUnited States
                                13335CLOUDFLARENETUSfalse
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1427743
                                Start date and time:2024-04-18 03:33:06 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 6m 59s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:6
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 97%
                                • Number of executed functions: 164
                                • Number of non-executed functions: 26
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                03:33:56API Interceptor27x Sleep call for process: SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                50.87.219.149Ziraat Swift Bildirimi.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • www.hyperfocusmasterclass.com/gg58/?f0=BXeHzp&3f=5Ix8alVOa82T/DZIfBhrjeSKtZ641IDQQHgZKH1ZvtSurMdm0kyXcXMOnWQHCxpuENZh
                                Ziraat Swift Bildirimi.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • www.hyperfocusmasterclass.com/gg58/?RZwp=5Ix8alVOa82T/DZIfBhrjeSKtZ641IDQQHgZKH1ZvtSurMdm0kyXcXMOnWQHCxpuENZh&2d6tXz=j8vX
                                104.26.13.205SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.28151.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                • api.ipify.org/
                                Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                                • api.ipify.org/?format=json
                                ArenaWarSetup.exeGet hashmaliciousStealitBrowse
                                • api.ipify.org/?format=json
                                Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/?format=json
                                E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                SecuriteInfo.com.Win64.RATX-gen.31127.4101.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                                • api.ipify.org/
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                mail.alkuwaiti.comBank slip.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.219.149
                                PO#240.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.219.149
                                Shipping Docs.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.219.149
                                SecuriteInfo.com.W32.MSIL_Kryptik.DWR.gen.Eldorado.6551.17723.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.219.149
                                api.ipify.orginvoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                • 172.67.74.152
                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                • 172.67.74.152
                                Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.12.205
                                SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                payload.jsGet hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                payload.jsGet hashmaliciousUnknownBrowse
                                • 172.67.74.152
                                Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.12.205
                                Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.12.205
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                UNIFIEDLAYER-AS-1USinvoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                • 162.241.123.30
                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                • 162.241.123.30
                                Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.219.149
                                https://tracker.club-os.com/campaign/click?msgId=f8ea317d963149a518aa35e03e5541f797badf3c&target=splendidanimations.com%2F%40%2FQuantexa/IpoXF42991IpoXF42991IpoXF/bWFzc2ltb2JvcnJlbGxpQHF1YW50ZXhhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                • 192.185.104.70
                                QUOTATION-#170424.exeGet hashmaliciousAgentTeslaBrowse
                                • 192.254.225.136
                                PURCHASE ORDER LISTS GREEN VALLY CORP.batGet hashmaliciousGuLoaderBrowse
                                • 173.254.31.34
                                draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                • 192.185.13.234
                                signed documents and BOL.exeGet hashmaliciousAgentTeslaBrowse
                                • 162.241.123.30
                                DN.exeGet hashmaliciousAgentTeslaBrowse
                                • 50.87.253.239
                                2llKbb9pR7.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, RedLine, SmokeLoaderBrowse
                                • 198.57.242.153
                                CLOUDFLARENETUSSecuriteInfo.com.Win64.CrypterX-gen.2144.26023.exeGet hashmaliciousGlupteba, PureLog Stealer, zgRATBrowse
                                • 104.21.91.214
                                http://ranchpools.comGet hashmaliciousUnknownBrowse
                                • 104.19.178.52
                                invoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                • 172.67.74.152
                                http://t.cm.morganstanley.com/r/?id=h1b92d14%2C134cc33c%2C1356be32&p1=www.saiengroup.com%2Fteaz%2F648c482b60b3906833c9304bab170add%2FJBVNhz%2FYW15LmNoZW5AZG91YmxlbGluZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                • 104.17.25.14
                                SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exeGet hashmaliciousUnknownBrowse
                                • 172.67.184.140
                                https://windowdefalerts-error0x21906-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 172.67.176.240
                                https://windowdefalerts-error0x21903-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 172.66.44.169
                                https://windowdefalerts-error0x21905-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 104.21.56.41
                                SecuriteInfo.com.Heuristic.HEUR.AGEN.1343277.7061.14046.exeGet hashmaliciousUnknownBrowse
                                • 104.21.75.251
                                https://windowdefalerts-error0x21908-alert-virus-detected.pages.dev/Get hashmaliciousTechSupportScamBrowse
                                • 172.66.47.160
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                3b5074b1b5d032e5620f69f9f700ff0einvoice & packing list.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                ZG17uv37pi.exeGet hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                http://mitchellind.ubpages.com/mi-ind/Get hashmaliciousUnknownBrowse
                                • 104.26.13.205
                                Fizetes,jpg.scr.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                SecuriteInfo.com.FileRepMalware.7644.21541.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                Payment Advice.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                Draft Sales contract.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                Bank slip.exeGet hashmaliciousAgentTeslaBrowse
                                • 104.26.13.205
                                https://tracker.club-os.com/campaign/click?msgId=f8ea317d963149a518aa35e03e5541f797badf3c&target=splendidanimations.com%2F%40%2FQuantexa/IpoXF42991IpoXF42991IpoXF/bWFzc2ltb2JvcnJlbGxpQHF1YW50ZXhhLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                • 104.26.13.205
                                No context
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):2056
                                Entropy (8bit):5.342567089024067
                                Encrypted:false
                                SSDEEP:48:MxHKlYHKh3ouHgJHreylEHMHKo/tHo6hAHKzeRHKx1qHKHxvj:iqlYqh3ou0aymsqwtI6eqzqqxwqRb
                                MD5:83A6E29FD802325CCCB720870B60C618
                                SHA1:4CD8AC6CA2659E4E32D1B27A8A4E77ABF980EE43
                                SHA-256:A81A5B984180553C06E7C9CAE0BAF7E195950801F493996F48FA59F1ACC135B2
                                SHA-512:69CC81145ACCA3D5C154D3A11396C2AFAEC4135662A82124EA249817BE7066D782DE2C79FE985E23F32F9709C144E2C513C727CFD1A88D677F34EB25E868B560
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\WindowsBase\4d760e3e4675c4a4c66b64205fb0d001\WindowsBase.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\17470ef0c7a174f38bdcadacc3e310ad\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.964847684361756
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                File size:680'448 bytes
                                MD5:f4babeed860c7952cb00bae31c4bfa54
                                SHA1:c818efd3d709df2baa44767b1332bb2df045f7a8
                                SHA256:ef171f71804fe96bf375379c691e1f93b3fe38a3535b24f8f19d104e5eecf7aa
                                SHA512:d5f5ab36fc76b4c4bb59acf32c6dc5affaf53062168a74f5695d6e29e901e0f96d3826d819c90f03e7b70cab0d33a4d4f3686a8b5a4749b7545fded848fd3a8b
                                SSDEEP:12288:ejIBUOFFIJJzbCU6WQjXgoCxXU7pKa+aGzPPH44FZVEJJM3NrYK:2I1vsJPF6jC5U7pn+VJ5CJAX
                                TLSH:ACE4231DAFA4D60FDA3C96F60A2209884331D4D94883E3C9FCC465D65D697CBA8C5BB3
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q f.................>...".......\... ........@.. ....................................@................................
                                Icon Hash:0f235999b9792317
                                Entrypoint:0x4a5c0e
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x66205197 [Wed Apr 17 22:47:51 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa5bbc0x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x2000.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa80000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xa3c140xa3e00be9d2b043baf689464daf30ed9784fb1False0.971751942696415SysEx File -7.9719974623886785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xa60000x20000x20006824abcab3fa60d127b85dacfeee666dFalse0.851318359375data7.304805145291916IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xa80000xc0x200669e361a14f62b6708eab535dbf63ccbFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0xa61000x1834PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9917688831504197
                                RT_GROUP_ICON0xa79440x14data1.05
                                RT_VERSION0xa79680x350data0.4410377358490566
                                RT_MANIFEST0xa7cc80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 03:34:00.385754108 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.385799885 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.385860920 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.408349991 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.408370018 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.634191036 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.634530067 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.637185097 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.637212992 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.637643099 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.677774906 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.689352989 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.732145071 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.938036919 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.938092947 CEST44349708104.26.13.205192.168.2.5
                                Apr 18, 2024 03:34:00.938134909 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:00.943905115 CEST49708443192.168.2.5104.26.13.205
                                Apr 18, 2024 03:34:01.600583076 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:01.754460096 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:01.754638910 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:02.361319065 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.361546040 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:02.515302896 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.515696049 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:02.671475887 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.671964884 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:02.834177971 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.834203005 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.834220886 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:02.834249020 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:02.863776922 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:03.018074036 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.020659924 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:03.174410105 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.175627947 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:03.329879999 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.330980062 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:03.524805069 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.666218042 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.666461945 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:03.820075989 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.820122004 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:03.820465088 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.014755011 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.130382061 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.130634069 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.286247969 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.286273956 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.286935091 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.286994934 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.287017107 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.287389994 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:34:04.440582037 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.440648079 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.441307068 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:34:04.490173101 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:35:41.490461111 CEST49709587192.168.2.550.87.219.149
                                Apr 18, 2024 03:35:41.644318104 CEST5874970950.87.219.149192.168.2.5
                                Apr 18, 2024 03:35:41.644943953 CEST49709587192.168.2.550.87.219.149
                                TimestampSource PortDest PortSource IPDest IP
                                Apr 18, 2024 03:34:00.265655041 CEST5461153192.168.2.51.1.1.1
                                Apr 18, 2024 03:34:00.370167971 CEST53546111.1.1.1192.168.2.5
                                Apr 18, 2024 03:34:01.470947981 CEST5776953192.168.2.51.1.1.1
                                Apr 18, 2024 03:34:01.599919081 CEST53577691.1.1.1192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Apr 18, 2024 03:34:00.265655041 CEST192.168.2.51.1.1.10x859bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                Apr 18, 2024 03:34:01.470947981 CEST192.168.2.51.1.1.10xa7b2Standard query (0)mail.alkuwaiti.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Apr 18, 2024 03:34:00.370167971 CEST1.1.1.1192.168.2.50x859bNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                Apr 18, 2024 03:34:00.370167971 CEST1.1.1.1192.168.2.50x859bNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                Apr 18, 2024 03:34:00.370167971 CEST1.1.1.1192.168.2.50x859bNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                Apr 18, 2024 03:34:01.599919081 CEST1.1.1.1192.168.2.50xa7b2No error (0)mail.alkuwaiti.com50.87.219.149A (IP address)IN (0x0001)false
                                • api.ipify.org
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.549708104.26.13.2054432136C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                TimestampBytes transferredDirectionData
                                2024-04-18 01:34:00 UTC155OUTGET / HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                Host: api.ipify.org
                                Connection: Keep-Alive
                                2024-04-18 01:34:00 UTC211INHTTP/1.1 200 OK
                                Date: Thu, 18 Apr 2024 01:34:00 GMT
                                Content-Type: text/plain
                                Content-Length: 12
                                Connection: close
                                Vary: Origin
                                CF-Cache-Status: DYNAMIC
                                Server: cloudflare
                                CF-RAY: 8760e8f71c8c12e9-ATL
                                2024-04-18 01:34:00 UTC12INData Raw: 38 31 2e 31 38 31 2e 35 37 2e 35 32
                                Data Ascii: 81.181.57.52


                                TimestampSource PortDest PortSource IPDest IPCommands
                                Apr 18, 2024 03:34:02.361319065 CEST5874970950.87.219.149192.168.2.5220-box2389.bluehost.com ESMTP Exim 4.96.2 #2 Wed, 17 Apr 2024 19:34:02 -0600
                                220-We do not authorize the use of this system to transport unsolicited,
                                220 and/or bulk e-mail.
                                Apr 18, 2024 03:34:02.361546040 CEST49709587192.168.2.550.87.219.149EHLO 849224
                                Apr 18, 2024 03:34:02.515302896 CEST5874970950.87.219.149192.168.2.5250-box2389.bluehost.com Hello 849224 [81.181.57.52]
                                250-SIZE 52428800
                                250-8BITMIME
                                250-PIPELINING
                                250-PIPECONNECT
                                250-AUTH PLAIN LOGIN
                                250-STARTTLS
                                250 HELP
                                Apr 18, 2024 03:34:02.515696049 CEST49709587192.168.2.550.87.219.149STARTTLS
                                Apr 18, 2024 03:34:02.671475887 CEST5874970950.87.219.149192.168.2.5220 TLS go ahead

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:03:33:56
                                Start date:18/04/2024
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
                                Imagebase:0xb50000
                                File size:680'448 bytes
                                MD5 hash:F4BABEED860C7952CB00BAE31C4BFA54
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2066897818.0000000004E04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:03:33:59
                                Start date:18/04/2024
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.MalwareX-gen.3610.30636.exe"
                                Imagebase:0x980000
                                File size:680'448 bytes
                                MD5 hash:F4BABEED860C7952CB00BAE31C4BFA54
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3261785904.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3261785904.0000000002DC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3261785904.0000000002DEC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.3260191325.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:8%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:167
                                  Total number of Limit Nodes:11
                                  execution_graph 25898 139ddb8 25899 139ddfa 25898->25899 25900 139de00 GetModuleHandleW 25898->25900 25899->25900 25901 139de2d 25900->25901 25902 78c210b 25903 78c205d 25902->25903 25904 78c2115 25902->25904 25909 78c2ee8 25904->25909 25927 78c2f56 25904->25927 25946 78c2ef8 25904->25946 25905 78c2328 25910 78c2eed 25909->25910 25911 78c2f36 25910->25911 25964 78c339c 25910->25964 25970 78c3483 25910->25970 25975 78c3da2 25910->25975 25981 78c3621 25910->25981 25989 78c344b 25910->25989 25994 78c364a 25910->25994 25999 78c3729 25910->25999 26004 78c3769 25910->26004 26011 78c340c 25910->26011 26016 78c3931 25910->26016 26021 78c3991 25910->26021 26026 78c331b 25910->26026 26031 78c34fa 25910->26031 26036 78c3898 25910->26036 26041 78c36df 25910->26041 25911->25905 25928 78c2ee4 25927->25928 25929 78c2f59 25927->25929 25930 78c340c 2 API calls 25928->25930 25931 78c3769 4 API calls 25928->25931 25932 78c3729 2 API calls 25928->25932 25933 78c364a 2 API calls 25928->25933 25934 78c344b 2 API calls 25928->25934 25935 78c3621 4 API calls 25928->25935 25936 78c3da2 2 API calls 25928->25936 25937 78c3483 2 API calls 25928->25937 25938 78c339c 2 API calls 25928->25938 25939 78c36df 2 API calls 25928->25939 25940 78c3898 2 API calls 25928->25940 25941 78c34fa 2 API calls 25928->25941 25942 78c331b 2 API calls 25928->25942 25943 78c3991 2 API calls 25928->25943 25944 78c3931 2 API calls 25928->25944 25945 78c2f36 25928->25945 25929->25905 25930->25945 25931->25945 25932->25945 25933->25945 25934->25945 25935->25945 25936->25945 25937->25945 25938->25945 25939->25945 25940->25945 25941->25945 25942->25945 25943->25945 25944->25945 25945->25905 25947 78c2f12 25946->25947 25948 78c2f36 25947->25948 25949 78c340c 2 API calls 25947->25949 25950 78c3769 4 API calls 25947->25950 25951 78c3729 2 API calls 25947->25951 25952 78c364a 2 API calls 25947->25952 25953 78c344b 2 API calls 25947->25953 25954 78c3621 4 API calls 25947->25954 25955 78c3da2 2 API calls 25947->25955 25956 78c3483 2 API calls 25947->25956 25957 78c339c 2 API calls 25947->25957 25958 78c36df 2 API calls 25947->25958 25959 78c3898 2 API calls 25947->25959 25960 78c34fa 2 API calls 25947->25960 25961 78c331b 2 API calls 25947->25961 25962 78c3991 2 API calls 25947->25962 25963 78c3931 2 API calls 25947->25963 25948->25905 25949->25948 25950->25948 25951->25948 25952->25948 25953->25948 25954->25948 25955->25948 25956->25948 25957->25948 25958->25948 25959->25948 25960->25948 25961->25948 25962->25948 25963->25948 25966 78c332f 25964->25966 25965 78c3de7 25965->25911 25966->25965 26046 78c1bfc 25966->26046 26050 78c1c08 25966->26050 25971 78c3490 25970->25971 26054 78c0ac8 25971->26054 26058 78c0ac0 25971->26058 25972 78c358a 25972->25911 25977 78c3336 25975->25977 25976 78c3de7 25976->25911 25977->25976 25979 78c1bfc CreateProcessA 25977->25979 25980 78c1c08 CreateProcessA 25977->25980 25978 78c33d7 25978->25911 25979->25978 25980->25978 25982 78c3818 25981->25982 26062 78c3fc8 25982->26062 26067 78c3fb9 25982->26067 25983 78c3414 25983->25911 25984 78c3402 25984->25983 26072 78c1578 25984->26072 26076 78c1580 25984->26076 25990 78c3451 25989->25990 25992 78c1578 WriteProcessMemory 25990->25992 25993 78c1580 WriteProcessMemory 25990->25993 25991 78c3b28 25992->25991 25993->25991 25995 78c36e6 25994->25995 25996 78c3704 25995->25996 26088 78c1088 25995->26088 26092 78c1082 25995->26092 25996->25911 26000 78c3402 25999->26000 26000->25999 26001 78c3414 26000->26001 26002 78c1578 WriteProcessMemory 26000->26002 26003 78c1580 WriteProcessMemory 26000->26003 26001->25911 26002->26000 26003->26000 26096 78c1669 26004->26096 26100 78c1670 26004->26100 26005 78c3402 26006 78c3414 26005->26006 26009 78c1578 WriteProcessMemory 26005->26009 26010 78c1580 WriteProcessMemory 26005->26010 26006->25911 26009->26005 26010->26005 26012 78c3402 26011->26012 26013 78c3414 26012->26013 26014 78c1578 WriteProcessMemory 26012->26014 26015 78c1580 WriteProcessMemory 26012->26015 26013->25911 26014->26012 26015->26012 26017 78c3402 26016->26017 26018 78c3414 26017->26018 26019 78c1578 WriteProcessMemory 26017->26019 26020 78c1580 WriteProcessMemory 26017->26020 26018->25911 26019->26017 26020->26017 26022 78c3d5f 26021->26022 26024 78c0b78 Wow64SetThreadContext 26022->26024 26025 78c0b70 Wow64SetThreadContext 26022->26025 26023 78c3a35 26023->25911 26024->26023 26025->26023 26027 78c3336 26026->26027 26029 78c1bfc CreateProcessA 26027->26029 26030 78c1c08 CreateProcessA 26027->26030 26028 78c33d7 26028->25911 26029->26028 26030->26028 26032 78c3500 26031->26032 26034 78c1578 WriteProcessMemory 26032->26034 26035 78c1580 WriteProcessMemory 26032->26035 26033 78c3522 26033->25911 26034->26033 26035->26033 26037 78c3402 26036->26037 26038 78c3414 26037->26038 26039 78c1578 WriteProcessMemory 26037->26039 26040 78c1580 WriteProcessMemory 26037->26040 26038->25911 26039->26037 26040->26037 26042 78c3689 26041->26042 26042->26041 26044 78c1088 VirtualAllocEx 26042->26044 26045 78c1082 VirtualAllocEx 26042->26045 26043 78c3704 26043->25911 26044->26043 26045->26043 26047 78c1c08 CreateProcessA 26046->26047 26049 78c1e53 26047->26049 26051 78c1c91 CreateProcessA 26050->26051 26053 78c1e53 26051->26053 26055 78c0b08 ResumeThread 26054->26055 26057 78c0b39 26055->26057 26057->25972 26059 78c0ac8 ResumeThread 26058->26059 26061 78c0b39 26059->26061 26061->25972 26063 78c3fdd 26062->26063 26080 78c0b78 26063->26080 26084 78c0b70 26063->26084 26064 78c3ff3 26064->25984 26068 78c3fc8 26067->26068 26070 78c0b78 Wow64SetThreadContext 26068->26070 26071 78c0b70 Wow64SetThreadContext 26068->26071 26069 78c3ff3 26069->25984 26070->26069 26071->26069 26073 78c1580 WriteProcessMemory 26072->26073 26075 78c161f 26073->26075 26075->25984 26077 78c15c8 WriteProcessMemory 26076->26077 26079 78c161f 26077->26079 26079->25984 26081 78c0bbd Wow64SetThreadContext 26080->26081 26083 78c0c05 26081->26083 26083->26064 26085 78c0b78 Wow64SetThreadContext 26084->26085 26087 78c0c05 26085->26087 26087->26064 26089 78c10c8 VirtualAllocEx 26088->26089 26091 78c1105 26089->26091 26091->25996 26093 78c1088 VirtualAllocEx 26092->26093 26095 78c1105 26093->26095 26095->25996 26097 78c1670 ReadProcessMemory 26096->26097 26099 78c16ff 26097->26099 26099->26005 26101 78c16bb ReadProcessMemory 26100->26101 26103 78c16ff 26101->26103 26103->26005 26104 139de60 26105 139de74 26104->26105 26107 139de99 26105->26107 26108 139d150 26105->26108 26109 139e020 LoadLibraryExW 26108->26109 26111 139e099 26109->26111 26111->26107

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 533 7420eb9-7420ee8 534 7420eea-7420f15 533->534 535 7420e6e-7420eb8 533->535 536 7420f17 534->536 537 7420f1c-7420f58 534->537 536->537 608 7420f5a call 7421520 537->608 609 7420f5a call 7421530 537->609 540 7420f60 541 7420f67-7420f83 540->541 542 7420f85 541->542 543 7420f8c-7420f8d 541->543 542->540 542->543 544 7421044-7421064 542->544 545 7421205-7421211 542->545 546 7421105-7421111 542->546 547 742128b-7421298 542->547 548 742100f-7421018 542->548 549 7420f92-7420fa9 542->549 550 74212d0-74212e7 542->550 551 74211d1-74211dd 542->551 552 7421154-7421169 542->552 553 7421254-7421260 542->553 554 7420fd8-7420fe4 542->554 555 742119e-74211b3 542->555 556 742131c-742132f 542->556 557 742129d-74212af 542->557 558 7420fab-7420faf 542->558 559 7421069-7421075 542->559 560 742116e-7421172 542->560 561 74210ee-7421100 542->561 562 742122f-742124f 542->562 563 742112f-742114f 542->563 564 74212ec-74212f0 542->564 565 74212b4-74212cb 542->565 566 74210ba-74210c6 542->566 567 74211b8-74211cc 542->567 543->556 544->541 586 7421213 545->586 587 7421218-742122a 545->587 572 7421113 546->572 573 7421118-742112a 546->573 547->541 576 742101a-7421029 548->576 577 742102b-7421032 548->577 549->541 550->541 584 74211e4 551->584 585 74211df 551->585 552->541 570 7421262 553->570 571 7421267-7421286 553->571 574 7420fe6 554->574 575 7420feb-742100a 554->575 555->541 557->541 568 7420fc2-7420fc9 558->568 569 7420fb1-7420fc0 558->569 582 7421077 559->582 583 742107c-7421092 559->583 580 7421174-7421183 560->580 581 7421185-742118c 560->581 561->541 562->541 563->541 578 74212f2-7421301 564->578 579 7421303-742130a 564->579 565->541 588 74210c8 566->588 589 74210cd-74210e9 566->589 567->541 591 7420fd0-7420fd6 568->591 569->591 570->571 571->541 572->573 573->541 574->575 575->541 592 7421039-742103f 576->592 577->592 593 7421311-7421317 578->593 579->593 597 7421193-7421199 580->597 581->597 582->583 605 7421094 583->605 606 7421099-74210b5 583->606 603 74211ee-7421200 584->603 585->584 586->587 587->541 588->589 589->541 591->541 592->541 593->541 597->541 603->541 605->606 606->541 608->540 609->540
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: tIh
                                  • API String ID: 0-443931868
                                  • Opcode ID: 6050a9b61092aadc55e2635cba156c9184de305fecf817e8c69e349d7e2d5401
                                  • Instruction ID: edc8f7d1a78eca07c15c51dbf23a7c516c8fd34d6cea02adb352c6eb05af84c1
                                  • Opcode Fuzzy Hash: 6050a9b61092aadc55e2635cba156c9184de305fecf817e8c69e349d7e2d5401
                                  • Instruction Fuzzy Hash: B1E138B0D1521ACFDB04CFA5C5818AEFBB2FF89300B55D566E415AB215C734AA93CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: tIh
                                  • API String ID: 0-443931868
                                  • Opcode ID: 32b2841a2db479c2e2562dca54d5b652ce2eb0a0bb5b6676e4e70c07d6c46763
                                  • Instruction ID: 47e67429c38042bdcdd88cfff050bdbb863f42f008506d337adfd83b125f1518
                                  • Opcode Fuzzy Hash: 32b2841a2db479c2e2562dca54d5b652ce2eb0a0bb5b6676e4e70c07d6c46763
                                  • Instruction Fuzzy Hash: C9D115B0E1521ADFCB04CF99C5818AEFBB2FB89300F51D566E425AB214D734AA53CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2069065255.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: true
                                  • Associated: 00000000.00000002.2068878545.00000000056D0000.00000004.08000000.00040000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dd9f68de919465d4eb42fbd6836c1dc4b92016e70db486d095bf695f389652bb
                                  • Instruction ID: a37a8ac7e7348636b59dc568933374d8849be67053e69a0806e94e1e889e7b04
                                  • Opcode Fuzzy Hash: dd9f68de919465d4eb42fbd6836c1dc4b92016e70db486d095bf695f389652bb
                                  • Instruction Fuzzy Hash: 3AA13832A0469E9BDF218B38F804B9EFFE2FF01B90F0A85E9D0A457651C771A544E785
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3af13c535904c37f52bd00918e5b3862f448794f17db8afc87cf964405f26b9c
                                  • Instruction ID: 80ddf32876f41827d8e4283f35b90babb2559084ca9084dd956cc2973ffacda4
                                  • Opcode Fuzzy Hash: 3af13c535904c37f52bd00918e5b3862f448794f17db8afc87cf964405f26b9c
                                  • Instruction Fuzzy Hash: 1D9128B0D15259DFCB48CFAAE5809DDFBB2FB89300F60A41AE016B7224D7349956DF14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49f4aad0dd16dcd27b72ae775a6010397364096ef2d3b5bacc678407c66ab607
                                  • Instruction ID: 35f4986f90b4e5f61bc3e0e48d9bd9c4de272ea61ddaa316cf594e1b054a483a
                                  • Opcode Fuzzy Hash: 49f4aad0dd16dcd27b72ae775a6010397364096ef2d3b5bacc678407c66ab607
                                  • Instruction Fuzzy Hash: F49138B0D15259DFCB48CFA9E5809DDFBB2FB89300F60A42AE016B7224D7349956DF14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 947a2dc7f1c0608cb6fdc2af16db8d59e1cdbc463292043f7f7143adf0845de1
                                  • Instruction ID: 0af3df71c91a3b99de5b564001ebc09080083a7e322c8f3010b8842dede6a2d1
                                  • Opcode Fuzzy Hash: 947a2dc7f1c0608cb6fdc2af16db8d59e1cdbc463292043f7f7143adf0845de1
                                  • Instruction Fuzzy Hash: 8B8113B5E14229DFCB04CFAAC8409EEFBB1FB89200F50995AE415B7364D738A912DF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 35555503353b24c6ffef8e3739de04308fa0dcdff080f7ec3e3bd7765ab6a998
                                  • Instruction ID: 715afef48714a5b262dacd720d2781aa5aab6c0251b8f7a9ea2968a5df0c4897
                                  • Opcode Fuzzy Hash: 35555503353b24c6ffef8e3739de04308fa0dcdff080f7ec3e3bd7765ab6a998
                                  • Instruction Fuzzy Hash: 5981F3B5E14229DFCB04CFAAC8409EEFBB1FB89300F50995AE415A7364D738A912DF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4c79439018b8a2daa7766e2075c34e66e05cafabdea2fab2e222ce3613161f5
                                  • Instruction ID: 61cd4fb76f49cb29bf832ef9c7de4e10c6db08b6090fca64307b5b22cc1faaf0
                                  • Opcode Fuzzy Hash: e4c79439018b8a2daa7766e2075c34e66e05cafabdea2fab2e222ce3613161f5
                                  • Instruction Fuzzy Hash: 26314171D057948FD71ACF6788502DEBFF3AFCA310F19C0A6D444AB266DA741946CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f3a700620b6d939d53ae4e019f108f85bc226fe1d4ba82be76af70192e2cbe15
                                  • Instruction ID: db0da46acf38107341821f24cea1bbeb161f648efcf24f51fd6baaee7cb49751
                                  • Opcode Fuzzy Hash: f3a700620b6d939d53ae4e019f108f85bc226fe1d4ba82be76af70192e2cbe15
                                  • Instruction Fuzzy Hash: 5A21EAB1E016188BEB18CF9BD9442DEFBF7AFC8310F14C17AD408A6268DB741A56CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 459c4f11c2f1c75a3a7b5dd0938fc0a82ec49b9c0573aeccc9a94eb1ca5f1850
                                  • Instruction ID: f3e19a8300bce200e7b43849a381bf9baa9fbde8ab0721a82b2284dd872e0b62
                                  • Opcode Fuzzy Hash: 459c4f11c2f1c75a3a7b5dd0938fc0a82ec49b9c0573aeccc9a94eb1ca5f1850
                                  • Instruction Fuzzy Hash: E1A002C4CBF54CC18040DC2424584F5D53C523B008F50F00C814BF39560E74C003092F
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 373 7425378-742539b 374 74253d4-7425427 373->374 380 742542e-7425438 374->380 381 7425490-7425496 380->381 382 742543a-7425444 380->382 383 742539d-74253a0 382->383 385 74253a2 383->385 386 74253a9-74253c0 383->386 385->374 385->380 385->386 387 7425449-7425464 385->387 386->381 389 74253c6-74253d2 386->389 392 7425466-742546c 387->392 393 742547c-742548f 387->393 389->383 394 7425470-7425472 392->394 395 742546e 392->395 394->393 395->393
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8aq$8aq
                                  • API String ID: 0-1589283582
                                  • Opcode ID: 34e7562558322816b094e4551682eccb50b13922e6a061f00e12f429505923b6
                                  • Instruction ID: 725e2adeb8f9948e279f393c27516de992ac89820fcfe4f3c1fbb1705e6da15f
                                  • Opcode Fuzzy Hash: 34e7562558322816b094e4551682eccb50b13922e6a061f00e12f429505923b6
                                  • Instruction Fuzzy Hash: B721C370B402158FD700DB7CC845ABEF7E6EF85301FA045ABD109DB395EA74AD128765
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 397 7421530-742154e 398 7421550 397->398 399 7421555-742155a 397->399 398->399 411 742155d call 7421628 399->411 412 742155d call 7421619 399->412 400 7421563 401 742156a-7421586 400->401 402 7421588 401->402 403 742158f-7421590 401->403 402->400 404 7421592-74215a6 402->404 405 74215d6-74215f8 402->405 406 74215fd-7421601 402->406 403->404 403->406 408 74215a8-74215b7 404->408 409 74215b9-74215c0 404->409 405->401 410 74215c7-74215d4 408->410 409->410 410->401 411->400 412->400
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 3H5$3H5
                                  • API String ID: 0-2752242361
                                  • Opcode ID: c1d52c5de6a4cb988c7caa8f2641973be63d9cca6ee2633a8405aa994525f776
                                  • Instruction ID: c1e8683f135603262817840bef56deabf49f78c2580b0d1790a91dcfe16447d0
                                  • Opcode Fuzzy Hash: c1d52c5de6a4cb988c7caa8f2641973be63d9cca6ee2633a8405aa994525f776
                                  • Instruction Fuzzy Hash: 322136B0D11219DFCB04CFA9C540AAEFBF1FF89300F54C9AAD509A7214E7309A92DB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 418 78c1bfc-78c1c9d 421 78c1c9f-78c1ca9 418->421 422 78c1cd6-78c1cf6 418->422 421->422 423 78c1cab-78c1cad 421->423 429 78c1d2f-78c1d5e 422->429 430 78c1cf8-78c1d02 422->430 424 78c1caf-78c1cb9 423->424 425 78c1cd0-78c1cd3 423->425 427 78c1cbd-78c1ccc 424->427 428 78c1cbb 424->428 425->422 427->427 431 78c1cce 427->431 428->427 436 78c1d97-78c1e51 CreateProcessA 429->436 437 78c1d60-78c1d6a 429->437 430->429 432 78c1d04-78c1d06 430->432 431->425 434 78c1d08-78c1d12 432->434 435 78c1d29-78c1d2c 432->435 438 78c1d14 434->438 439 78c1d16-78c1d25 434->439 435->429 450 78c1e5a-78c1ee0 436->450 451 78c1e53-78c1e59 436->451 437->436 440 78c1d6c-78c1d6e 437->440 438->439 439->439 441 78c1d27 439->441 442 78c1d70-78c1d7a 440->442 443 78c1d91-78c1d94 440->443 441->435 445 78c1d7c 442->445 446 78c1d7e-78c1d8d 442->446 443->436 445->446 446->446 447 78c1d8f 446->447 447->443 461 78c1ef0-78c1ef4 450->461 462 78c1ee2-78c1ee6 450->462 451->450 464 78c1f04-78c1f08 461->464 465 78c1ef6-78c1efa 461->465 462->461 463 78c1ee8 462->463 463->461 466 78c1f18-78c1f1c 464->466 467 78c1f0a-78c1f0e 464->467 465->464 468 78c1efc 465->468 470 78c1f2e-78c1f35 466->470 471 78c1f1e-78c1f24 466->471 467->466 469 78c1f10 467->469 468->464 469->466 472 78c1f4c 470->472 473 78c1f37-78c1f46 470->473 471->470 475 78c1f4d 472->475 473->472 475->475
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 078C1E3E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: f4a94746b83b2fd384857fd7fd8c87d0b21de849abe9cc7e828d35df3f5aa190
                                  • Instruction ID: ff7991a63646eef9b0181e60b04e834e872a6e9384d882a88fe90ddb94fb3a75
                                  • Opcode Fuzzy Hash: f4a94746b83b2fd384857fd7fd8c87d0b21de849abe9cc7e828d35df3f5aa190
                                  • Instruction Fuzzy Hash: 1FA14AB1D0021ACFEB24DF69C8847EDBBB6BF48314F1481A9E809E7244DB749985CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 476 78c1c08-78c1c9d 478 78c1c9f-78c1ca9 476->478 479 78c1cd6-78c1cf6 476->479 478->479 480 78c1cab-78c1cad 478->480 486 78c1d2f-78c1d5e 479->486 487 78c1cf8-78c1d02 479->487 481 78c1caf-78c1cb9 480->481 482 78c1cd0-78c1cd3 480->482 484 78c1cbd-78c1ccc 481->484 485 78c1cbb 481->485 482->479 484->484 488 78c1cce 484->488 485->484 493 78c1d97-78c1e51 CreateProcessA 486->493 494 78c1d60-78c1d6a 486->494 487->486 489 78c1d04-78c1d06 487->489 488->482 491 78c1d08-78c1d12 489->491 492 78c1d29-78c1d2c 489->492 495 78c1d14 491->495 496 78c1d16-78c1d25 491->496 492->486 507 78c1e5a-78c1ee0 493->507 508 78c1e53-78c1e59 493->508 494->493 497 78c1d6c-78c1d6e 494->497 495->496 496->496 498 78c1d27 496->498 499 78c1d70-78c1d7a 497->499 500 78c1d91-78c1d94 497->500 498->492 502 78c1d7c 499->502 503 78c1d7e-78c1d8d 499->503 500->493 502->503 503->503 504 78c1d8f 503->504 504->500 518 78c1ef0-78c1ef4 507->518 519 78c1ee2-78c1ee6 507->519 508->507 521 78c1f04-78c1f08 518->521 522 78c1ef6-78c1efa 518->522 519->518 520 78c1ee8 519->520 520->518 523 78c1f18-78c1f1c 521->523 524 78c1f0a-78c1f0e 521->524 522->521 525 78c1efc 522->525 527 78c1f2e-78c1f35 523->527 528 78c1f1e-78c1f24 523->528 524->523 526 78c1f10 524->526 525->521 526->523 529 78c1f4c 527->529 530 78c1f37-78c1f46 527->530 528->527 532 78c1f4d 529->532 530->529 532->532
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 078C1E3E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 519036cc505f2c9f61864d03513990e06ab5ebe2a360c209668ac88d9398abee
                                  • Instruction ID: da905729ec208d41e6315d49f2b5c682b1eb81b5530cc02328d53b12799d30e7
                                  • Opcode Fuzzy Hash: 519036cc505f2c9f61864d03513990e06ab5ebe2a360c209668ac88d9398abee
                                  • Instruction Fuzzy Hash: 169148B1D0021ECFEB24DF69C8847EDBBB6AF48314F1485A9E809E7244DB749985CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 610 78c1578-78c15ce 613 78c15de-78c161d WriteProcessMemory 610->613 614 78c15d0-78c15dc 610->614 616 78c161f-78c1625 613->616 617 78c1626-78c1656 613->617 614->613 616->617
                                  APIs
                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 078C1610
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: bec6ea26f1b5abf632c59be6f56d171f479296face9078b91c921aa1018fae35
                                  • Instruction ID: eee39f16dd693b61b6f1632219659e94a5b42ac1688f89376daeab9a6d63f6ea
                                  • Opcode Fuzzy Hash: bec6ea26f1b5abf632c59be6f56d171f479296face9078b91c921aa1018fae35
                                  • Instruction Fuzzy Hash: 972128B5D003599FCB10DFAAC885BEEBBF5FF48310F10842AE919A7241C7789544CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 621 78c1580-78c15ce 623 78c15de-78c161d WriteProcessMemory 621->623 624 78c15d0-78c15dc 621->624 626 78c161f-78c1625 623->626 627 78c1626-78c1656 623->627 624->623 626->627
                                  APIs
                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 078C1610
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 610795224dac875334d45a19fa376d13af803bbeb2218d617eaa836529132866
                                  • Instruction ID: f9bca49051750787750d0135b374e5444f1c3491b47c13c62b060e6027a061ec
                                  • Opcode Fuzzy Hash: 610795224dac875334d45a19fa376d13af803bbeb2218d617eaa836529132866
                                  • Instruction Fuzzy Hash: 132139B5D003599FCB10DFAAC885BEEBBF5FF48310F108429E919A7241C7789944CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 631 78c0b70-78c0bc3 634 78c0bc5-78c0bd1 631->634 635 78c0bd3-78c0c03 Wow64SetThreadContext 631->635 634->635 637 78c0c0c-78c0c3c 635->637 638 78c0c05-78c0c0b 635->638 638->637
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 078C0BF6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: a94774c3f0098c9b073ed3a35673bd05d39a160b68d8590ec4dc557046ee3af2
                                  • Instruction ID: 0114f6a99558f9bb1a982f1b88a8ecd1a1d6fb0bd5e8bc7124bff403e234c9b4
                                  • Opcode Fuzzy Hash: a94774c3f0098c9b073ed3a35673bd05d39a160b68d8590ec4dc557046ee3af2
                                  • Instruction Fuzzy Hash: E12159B5D003099FDB10DFAAC4857EEBBF4EF48314F108429D559A7241CB78A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 642 78c1669-78c16fd ReadProcessMemory 646 78c16ff-78c1705 642->646 647 78c1706-78c1736 642->647 646->647
                                  APIs
                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 078C16F0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 8125929147e702c319cf70ba61ad5b72186f1cb6a88bf7acf3fff1bc229e5fe6
                                  • Instruction ID: 420ac9ca3a3f3d2103e6481b275126776452e4414f1e244d30548dbf9763e676
                                  • Opcode Fuzzy Hash: 8125929147e702c319cf70ba61ad5b72186f1cb6a88bf7acf3fff1bc229e5fe6
                                  • Instruction Fuzzy Hash: DE2119B5C002599FCB10DFAAC885AEEFBF5FF48310F50842AE519A7240C7389545CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 661 78c1670-78c16fd ReadProcessMemory 664 78c16ff-78c1705 661->664 665 78c1706-78c1736 661->665 664->665
                                  APIs
                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 078C16F0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 5b45d0187c59230cb6aae76139dc7ad4b29619d6cc9d8d54d5d5bea9b8dd5c00
                                  • Instruction ID: e0e062f004db149482d446dd2cdc8e2a542b7a0e2d1a446db757c36e7827beba
                                  • Opcode Fuzzy Hash: 5b45d0187c59230cb6aae76139dc7ad4b29619d6cc9d8d54d5d5bea9b8dd5c00
                                  • Instruction Fuzzy Hash: 2121F5B1C003599FCB10DFAAC885AEEFBF5FF48310F50842AE959A7250C7799945CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 651 78c0b78-78c0bc3 653 78c0bc5-78c0bd1 651->653 654 78c0bd3-78c0c03 Wow64SetThreadContext 651->654 653->654 656 78c0c0c-78c0c3c 654->656 657 78c0c05-78c0c0b 654->657 657->656
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 078C0BF6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 3138af1bd84a7a0ffd7a711bbfcae040eb83cb73d6a5af6790a02936c054bf5c
                                  • Instruction ID: 920540a240b7231de0c5e64ad4b0bead7dbbbc2c76291f15cf42fce860f25d73
                                  • Opcode Fuzzy Hash: 3138af1bd84a7a0ffd7a711bbfcae040eb83cb73d6a5af6790a02936c054bf5c
                                  • Instruction Fuzzy Hash: D32138B1D003098FDB10DFAAC4857EEBBF4EF48314F108429D559A7240CB789945CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 669 139d150-139e060 671 139e068-139e097 LoadLibraryExW 669->671 672 139e062-139e065 669->672 673 139e099-139e09f 671->673 674 139e0a0-139e0bd 671->674 672->671 673->674
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0139DE99,00000800,00000000,00000000), ref: 0139E08A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065681201.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1390000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: d5b0eb1ac299246357b16bcd1eca386f479b00afab6808b96710ffff004f5355
                                  • Instruction ID: 5ea7adece5eefa3cc2f3a59ed2c3e3ba859b2a7bbf4a66e97951a9a420d20ac9
                                  • Opcode Fuzzy Hash: d5b0eb1ac299246357b16bcd1eca386f479b00afab6808b96710ffff004f5355
                                  • Instruction Fuzzy Hash: 941114B6900308DFDB20DF9AC444BAEFBF4EB48314F10842AE519A7300C379A544CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 078C10F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 60509a9f0d8b1920eb450be0ee48f79f2e4ec7057bca43e6cf9652756ed7150c
                                  • Instruction ID: 44580634abc6439abb1e2d8a50a439e8b65cfa3b953ea70d354c94e0faec3861
                                  • Opcode Fuzzy Hash: 60509a9f0d8b1920eb450be0ee48f79f2e4ec7057bca43e6cf9652756ed7150c
                                  • Instruction Fuzzy Hash: 281147B5C042499FCB10DFAAC844BEEBFF5EF49310F24841AE559A7250C779A554CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 078C10F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: fd9cd4ca482ad07fbbe52ee09f1e214ba3f2f7023dc8c68eaa968ab1002ef721
                                  • Instruction ID: 7c277ca33903f4a0befe5e9a609fd6308016f568464ebeae6ecd4099f59e6e71
                                  • Opcode Fuzzy Hash: fd9cd4ca482ad07fbbe52ee09f1e214ba3f2f7023dc8c68eaa968ab1002ef721
                                  • Instruction Fuzzy Hash: 221137B5C002499FCB10DFAAC845AEEBFF5FF89310F20881AE519A7250C779A544CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: d241cf39e526e018912b65301a2edc8f194aa1a85e7bf4e4bef75386056fd7d3
                                  • Instruction ID: 31fa98e2b6462623c525050c934a70c5229fa88cb679fb34906b28bbb3127391
                                  • Opcode Fuzzy Hash: d241cf39e526e018912b65301a2edc8f194aa1a85e7bf4e4bef75386056fd7d3
                                  • Instruction Fuzzy Hash: EA1158B5C002488FDB20DFAAC8457EEFBF9EF89314F248419D519A7240CB39A545CFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 6c4959ce2a419988ea4bf3c1db3cb847d31e525c80143268bee345ee22663d32
                                  • Instruction ID: c1eb186aaa7aa52ddcc91512082da9336924c670ab39e6502e01c816dc28fbf8
                                  • Opcode Fuzzy Hash: 6c4959ce2a419988ea4bf3c1db3cb847d31e525c80143268bee345ee22663d32
                                  • Instruction Fuzzy Hash: 6A113AB1D002498FCB10DFAAC4457EEFBF5EF88314F208419D519A7240CB79A544CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0139DE1E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065681201.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1390000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: bec07e0fe8be1d30cb1231b048441d4e206fa50254b7f7530a4c7c3b66688394
                                  • Instruction ID: 96d79835da11fa2273e5dde36c64144833db0cf17d9f1d486be53e94a786d659
                                  • Opcode Fuzzy Hash: bec07e0fe8be1d30cb1231b048441d4e206fa50254b7f7530a4c7c3b66688394
                                  • Instruction Fuzzy Hash: CF11E0B5C002498FDB10DF9AD544ADEFBF5EF88314F10841AD919A7610C379A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 7dd6c60f8a342327d3806b6e20135e37495d80fb01091e9fd81b446ee005e12d
                                  • Instruction ID: cbe838e0b409304ac3c8a28d1015cb1dc9c465ec83b64cdf5c1b823947407cc7
                                  • Opcode Fuzzy Hash: 7dd6c60f8a342327d3806b6e20135e37495d80fb01091e9fd81b446ee005e12d
                                  • Instruction Fuzzy Hash: 9D418F71B002168FCB14DFB998489AFBBF6FFC4620B158969E459DB350DF30AD168790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .$/F
                                  • API String ID: 0-3545118181
                                  • Opcode ID: d8597564aa25460d2bf67ee0349003f8e85b5e09d683ac2d7f6a58ee874f2a32
                                  • Instruction ID: b3435d4bdf4a5bb61cddacf1adb5943253ce7553451a921b1e167a12fa3650ce
                                  • Opcode Fuzzy Hash: d8597564aa25460d2bf67ee0349003f8e85b5e09d683ac2d7f6a58ee874f2a32
                                  • Instruction Fuzzy Hash: 646171B4A00269CFCB10EF68D949AD97BB5FF49301F5085A6E80EA7715DB349D82CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: c136d4287a907add7368e01a0b5070909c970c0d7703ff6844ca1581846ad5fb
                                  • Instruction ID: ed2f85f494d620cef209d32880dddaf68ffd5dee3ad8635cb9d2b94fedc1fbf1
                                  • Opcode Fuzzy Hash: c136d4287a907add7368e01a0b5070909c970c0d7703ff6844ca1581846ad5fb
                                  • Instruction Fuzzy Hash: BA4105B4E04219CFCB09CFA9C8849EDFBB2FF49300F60846AD815AB261D7316916CF10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: O};5
                                  • API String ID: 0-3558557551
                                  • Opcode ID: 0d1bd68701458bffb283b1bb7b4923a0e6d34aeef6947a200a047d80b724cf0a
                                  • Instruction ID: 7059df4feeef04d75eddf22e80722676ff5c30ba77cbf4ef2c0563a871adca8a
                                  • Opcode Fuzzy Hash: 0d1bd68701458bffb283b1bb7b4923a0e6d34aeef6947a200a047d80b724cf0a
                                  • Instruction Fuzzy Hash: 54418FB0A20219EFCB44CF95D5858AEFFF1FB8A200FA0D896D005E7314DB349A22DB14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: O};5
                                  • API String ID: 0-3558557551
                                  • Opcode ID: 98ad4a2ddee0eb19412b13f874dc080ea8a7e9f011c10d625418e4ab753b2a00
                                  • Instruction ID: e3e773ad0f8f70a3b9f3c2c1570cf1864f8e78566b78fdae38acf33967177b69
                                  • Opcode Fuzzy Hash: 98ad4a2ddee0eb19412b13f874dc080ea8a7e9f011c10d625418e4ab753b2a00
                                  • Instruction Fuzzy Hash: 03418FB4A24619EFCB44CF95D58989DFFF1FB8A200FA0D896D044AB365DB349A21CB14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 163040fb4a171eda3e984e8cfeae7da397359ee63caea12f00d67842afa009bb
                                  • Instruction ID: 97cc604d34b555690af5fd8449f6619d2f15960a89472909e43acd91c23e628d
                                  • Opcode Fuzzy Hash: 163040fb4a171eda3e984e8cfeae7da397359ee63caea12f00d67842afa009bb
                                  • Instruction Fuzzy Hash: 2E31E2B4E14219CFCB08CFE9C8849EDBBB6FB89300F60952AD419AB355D731A906CF10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .$/F
                                  • API String ID: 0-3545118181
                                  • Opcode ID: 077ab4b9a5ba2d4677d02782355febad8b100eafe08b48f7f24e5f1b4d5dc4a2
                                  • Instruction ID: b9041d5d3c51bf62b7c6db878eb0ce1f404cbd5f7a0420706ecdfa09e8013f20
                                  • Opcode Fuzzy Hash: 077ab4b9a5ba2d4677d02782355febad8b100eafe08b48f7f24e5f1b4d5dc4a2
                                  • Instruction Fuzzy Hash: CE314BB4A40268CFCB54EF28E845BA87BB6FF85305F1081A6E84DA7745DB344D86CF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 3H5
                                  • API String ID: 0-3899204960
                                  • Opcode ID: 1fc5ae857107a9062843097470e6eccff84e531651bf24277a9ac024839b1d2d
                                  • Instruction ID: 8428e6a79a17916f0cdecb77a5caf53aea62e20620f24e2790911ea884b12418
                                  • Opcode Fuzzy Hash: 1fc5ae857107a9062843097470e6eccff84e531651bf24277a9ac024839b1d2d
                                  • Instruction Fuzzy Hash: 292123B0E11209DFCB04CFA9C540AAEFBF2BF89300F54C5AAD505A7350E7309A96DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: r
                                  • API String ID: 0-1812594589
                                  • Opcode ID: 7e2ac36daf58b7b8c8dbe39488f00dc2af162eaa10e10f69dca43f839cfbd2f0
                                  • Instruction ID: 328f776c6d5f5434a42ff4cb41510365cc33d6275c31fb4e372da2a03da7244e
                                  • Opcode Fuzzy Hash: 7e2ac36daf58b7b8c8dbe39488f00dc2af162eaa10e10f69dca43f839cfbd2f0
                                  • Instruction Fuzzy Hash: CF21F9B0929124DBCB54CF55D1849EDBBBAFB4E301FA0D956E40AA7206CB30A953DF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Te]q
                                  • API String ID: 0-52440209
                                  • Opcode ID: 2404cb182d6699b689981ed2baa76cd5bd454ffa0c1aeebd3f0ffa7a6102fc68
                                  • Instruction ID: 8430b37c66b76b73618fd6ce28fce11513d4b163b4b6b36a6c26d56b379bb546
                                  • Opcode Fuzzy Hash: 2404cb182d6699b689981ed2baa76cd5bd454ffa0c1aeebd3f0ffa7a6102fc68
                                  • Instruction Fuzzy Hash: CC115171B0121A8BCF04EFB999115EFB6F6AFC4610B5040BAD905EB344EF359D12CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ~z-
                                  • API String ID: 0-1730302399
                                  • Opcode ID: 9c09336cd540612a17490b0c3cfadb50d8ddd4653846737393ba0c8c908be08c
                                  • Instruction ID: eb3568f1a1797cc6233fe99060d46f89c756941e09a9cd85dcbb97770da05ce8
                                  • Opcode Fuzzy Hash: 9c09336cd540612a17490b0c3cfadb50d8ddd4653846737393ba0c8c908be08c
                                  • Instruction Fuzzy Hash: DCF030B0A85118CFC700EFD8E5595DC7BF9EB45304B109A2AD406AB619DB384D0A8B45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: r
                                  • API String ID: 0-1812594589
                                  • Opcode ID: 6299cdd875050d92a3167d2b390e7446748572b52d0af8e00859900b3d9354a9
                                  • Instruction ID: 74cfd0a1d9d9772ca6e14c819f549b4721e9a6912a99af6eeee391242d5bba71
                                  • Opcode Fuzzy Hash: 6299cdd875050d92a3167d2b390e7446748572b52d0af8e00859900b3d9354a9
                                  • Instruction Fuzzy Hash: 50F05AB4902228CFCB50CFA8C684AEDBBF5BB0D201F20455AE805A7301D739AE42CF25
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96f29371f48d45d368a85d2e5b457bb3209ccf0cab96c344276449f741f471b2
                                  • Instruction ID: 5dd1ce2d9bffdf3923c89c9fc6b95f59c6fa2173837efe44c6c56fa8dc620afe
                                  • Opcode Fuzzy Hash: 96f29371f48d45d368a85d2e5b457bb3209ccf0cab96c344276449f741f471b2
                                  • Instruction Fuzzy Hash: E5619EB4E1021ADFCB44CF94D445AEEBBB2FB89300F10892AE405B7354D7749A52CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6718f0c4c91218bbbce4fc1b37813c57075dfd4b49dde271b9cdd16328971dcb
                                  • Instruction ID: 86e1a24b9eaf7544603da8895f8d337da6bb29ce8e79877ebc0e3257d953d1b9
                                  • Opcode Fuzzy Hash: 6718f0c4c91218bbbce4fc1b37813c57075dfd4b49dde271b9cdd16328971dcb
                                  • Instruction Fuzzy Hash: 03613C75A00619DFCB14DFA9C454ADDBBF1FF88310F11815AE809AB360DB71AD92CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a55625d692dcbd5adce152100f08d32a93022a408481a26569e872ce658abc89
                                  • Instruction ID: ae9a8e79ee5829b363733e11090ebcce895d0fd3d17a55238dfdb6b01ecccfe3
                                  • Opcode Fuzzy Hash: a55625d692dcbd5adce152100f08d32a93022a408481a26569e872ce658abc89
                                  • Instruction Fuzzy Hash: DB613A75A00719DFDB14DFA9C458A9DBBF1FF88310F118599E409AB360DB71AD82CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e960635096812319741b23a1d316dc2a598740a6be7bdbdf6f5b4172c821402a
                                  • Instruction ID: 4ec28ccfd288d8a0d92ede9dfafbd0209627b3904883fa704055706ee07a6996
                                  • Opcode Fuzzy Hash: e960635096812319741b23a1d316dc2a598740a6be7bdbdf6f5b4172c821402a
                                  • Instruction Fuzzy Hash: 1041BCB89187848FC716CF69D464988BFB0EF8A201F1680D6D484DB3B3DB34A955CB26
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37b373ec3c0dbda4dfe8bea1c43067de74bfee73f027a3e4a9beaf7bd09b1302
                                  • Instruction ID: d40d559be8d57d049f3cf8f8bc20744e696a7931223aedc4faa618297da6f2af
                                  • Opcode Fuzzy Hash: 37b373ec3c0dbda4dfe8bea1c43067de74bfee73f027a3e4a9beaf7bd09b1302
                                  • Instruction Fuzzy Hash: 10419DB0A15165CFC3008F69C844AFEBBE8FB81309F8985B7E519DB692C338C856DB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 083a17ff47b5ea436d3d58a31c8fcc593638cbfba48f6cee230baa8ddf2e852f
                                  • Instruction ID: 44f0d5a0058e9f22c1e2cc1ae6b956afa9aeed2d0183b0330e5b9a32e628c7a2
                                  • Opcode Fuzzy Hash: 083a17ff47b5ea436d3d58a31c8fcc593638cbfba48f6cee230baa8ddf2e852f
                                  • Instruction Fuzzy Hash: F6418BB4E0420ADFCB04CF95D8459EEBBB2FF89310F10952AE504AB354DB749A52CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d2059c26c23bb74f6451d2c4519822cf855cfed9f4d106f3966df794c0518b1
                                  • Instruction ID: 93d6e43d4eed056b56775c0a6fa12ad786b7f66470f722bd7b5435eef7f6afee
                                  • Opcode Fuzzy Hash: 8d2059c26c23bb74f6451d2c4519822cf855cfed9f4d106f3966df794c0518b1
                                  • Instruction Fuzzy Hash: 4F314FF0D181198BDB08CF96C5406FEFBF6EB8A301F64D46AD419A3251EB345A52DF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7addb52f8e267366dcb2ef5c93b5622a9d64aa72f905ee6481f6fb06f3b994e0
                                  • Instruction ID: c458751e257bed5be5020d5a703a7672cda639dd8146d490d76b45a4cb727f2b
                                  • Opcode Fuzzy Hash: 7addb52f8e267366dcb2ef5c93b5622a9d64aa72f905ee6481f6fb06f3b994e0
                                  • Instruction Fuzzy Hash: F03137F4918219CFCB44CFA4C5815FEBBB5FB4A301F60555AD80AA7312EB306A12DFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 613e266b8a10877d90838f1e494d6d0a43aec1ec6f811c9b062d1a95e6ea6155
                                  • Instruction ID: 270e4ff28fdb12aa2b989b9cd73f4518a5e4d54361349eb50c9d9c57875db729
                                  • Opcode Fuzzy Hash: 613e266b8a10877d90838f1e494d6d0a43aec1ec6f811c9b062d1a95e6ea6155
                                  • Instruction Fuzzy Hash: 6F41ACB0E0420A9FCB04CF95D8459EEBBB2FF89310F10952AE504AB354DB749A52CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45b598e66de1dbf4579510df3ae1aec0d16b62d66e7ebc4ed085f375a205d9b9
                                  • Instruction ID: ff83692fb5c8f321cbd633fad0cfd37a8b76f66148c10aa4a10635827e52817f
                                  • Opcode Fuzzy Hash: 45b598e66de1dbf4579510df3ae1aec0d16b62d66e7ebc4ed085f375a205d9b9
                                  • Instruction Fuzzy Hash: BF317CB1900219AFCB14DFA9D845ADEBFF9EF49310F50846AE909E7310D735A954CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b957ee7a358c513d975923da1b727ff83afb7e9922d8ea3963f19cebec682ab
                                  • Instruction ID: 921c7241d3d9a6c4ac9761d71bf4bc63c5478777337ad8dff2af87aab9041e18
                                  • Opcode Fuzzy Hash: 7b957ee7a358c513d975923da1b727ff83afb7e9922d8ea3963f19cebec682ab
                                  • Instruction Fuzzy Hash: 0831ADB0A14165CFC3008F69C844ABEBBE8FB80309F8885B7E519DB691C338D892DA54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 024a9bfe2dc6f360c0ccb02bd87af1894df4e4cd457f5a6e082fc70fcd5726b0
                                  • Instruction ID: b3f525515dab108dc4b761e996d2c622bc2eedea369d224800c80c82adfcac0c
                                  • Opcode Fuzzy Hash: 024a9bfe2dc6f360c0ccb02bd87af1894df4e4cd457f5a6e082fc70fcd5726b0
                                  • Instruction Fuzzy Hash: D3313EF4D192188FDB08CF96C4002FEBBF6EB8A301F54D46AD459A3251EB345A52DF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8be95748ab700f9dd81f2bbe24158480121c3c29a11e3908f4cf4c779e087f6c
                                  • Instruction ID: f2b51350e3a60a089830cc46f096537b04eda5fbf917dcdf8a8a35e970ef59b0
                                  • Opcode Fuzzy Hash: 8be95748ab700f9dd81f2bbe24158480121c3c29a11e3908f4cf4c779e087f6c
                                  • Instruction Fuzzy Hash: 4D416CB4A40268CFCB14EF68E949A99BBB6FF45304F0185A6E809A7755DB349D86CF00
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cfe80824c4f9cbeb6b864286d26aa12147b4ca1978913c48d7c375e22c2df4b1
                                  • Instruction ID: ec65267316f3a5508696efec098f68513c7b973e7866702a0e94a25c2015b7f7
                                  • Opcode Fuzzy Hash: cfe80824c4f9cbeb6b864286d26aa12147b4ca1978913c48d7c375e22c2df4b1
                                  • Instruction Fuzzy Hash: 3E318CB4911169CFCB10DF68D4489AEBFF5FB09301F818566E80AAB311DB34AD42DF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065214708.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10ed000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 32a52435ae3fe37c63bf21608d1db9c4f3076555feb06abc10123dd5b68e815f
                                  • Instruction ID: b0c72c843ff81518784e49f3fd75e28548a20dbd9ecf881051088fba67fe3192
                                  • Opcode Fuzzy Hash: 32a52435ae3fe37c63bf21608d1db9c4f3076555feb06abc10123dd5b68e815f
                                  • Instruction Fuzzy Hash: 24213671104200EFCB15DF94D9C8F1ABFE5FB88314F2481A9E9490B256C33AC416CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df9e2baa1e33966e8b6211778403f9b5803fda3dae8440042b231c9d276bd226
                                  • Instruction ID: 2138e15326b33ddb467999d0c83eb158be6636a6233c8217dbcc10a4ea7667d1
                                  • Opcode Fuzzy Hash: df9e2baa1e33966e8b6211778403f9b5803fda3dae8440042b231c9d276bd226
                                  • Instruction Fuzzy Hash: 3D216870740229DFD7284A1D8808B6F76AFEBC1B00FE5886BE4064B395CE70D893D759
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065262178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10fd000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c5b323d411f8d201df6ca14721c132982a98803163931e06f071bf00d60a895
                                  • Instruction ID: 979bc18b57ffab6a32bfdc1b75e2856d780ea7e6196960c74b835f86ddc050d7
                                  • Opcode Fuzzy Hash: 7c5b323d411f8d201df6ca14721c132982a98803163931e06f071bf00d60a895
                                  • Instruction Fuzzy Hash: 10212571504200DFDB15DF68D581B16BFA5FB84314F20C5ADEA894B756C33AD407CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065262178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10fd000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b357615f605f4101269f06689c7dcc50ace8db348df8ea686bdd44a6a6075181
                                  • Instruction ID: 40f21df4496761e2b898ad20483cf504c468b8447681facfcac18955de99418c
                                  • Opcode Fuzzy Hash: b357615f605f4101269f06689c7dcc50ace8db348df8ea686bdd44a6a6075181
                                  • Instruction Fuzzy Hash: 8221F2B1604204DFDB05DFA8D9C1B2ABBA5FB84314F20C5ADDB894B656C37AD406CB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da86e784d8dc2577b4e0ee891d38eb0a127728b3609d6f09ff4723008a40c8fa
                                  • Instruction ID: b06ade3f202c7632c471f5a69ee5c3ca3bcffe7c5028658d2a67fe2015612077
                                  • Opcode Fuzzy Hash: da86e784d8dc2577b4e0ee891d38eb0a127728b3609d6f09ff4723008a40c8fa
                                  • Instruction Fuzzy Hash: 931106B0B002259FDB149E79A8046FB7AF6FF84720F95452EE806C7341DA30DA979BD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 061e3bd55e7e9747356cd136135c6072c0bf7e30d7c2cc62398cc30da68b62d6
                                  • Instruction ID: 5fd9893bb8891867842837286f1ebb4ca98c2f5bc205988e7feb6b4a8e0d262c
                                  • Opcode Fuzzy Hash: 061e3bd55e7e9747356cd136135c6072c0bf7e30d7c2cc62398cc30da68b62d6
                                  • Instruction Fuzzy Hash: 3A11DCF092C258DBCB00CF65D4804FEBFB8AB4B200F40A6ABD4195B212D7305A13EBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f4d0fc00fc39de7251452df9cedfd8cacc13f1a7ce9cf0092ffc4d9ff1a8c6c
                                  • Instruction ID: 706b1aecdaaf499c67ee373f65e09e377776c115e8e2ead70ada45b60194fd48
                                  • Opcode Fuzzy Hash: 5f4d0fc00fc39de7251452df9cedfd8cacc13f1a7ce9cf0092ffc4d9ff1a8c6c
                                  • Instruction Fuzzy Hash: C72178B0A06225CFD710CB19CA84BDAFBB6BF46305F95D596DC0897212C7309986DF11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 684f012e7229e96e008fa0c48169108c70c09cc9530de442a91312e16c4f4309
                                  • Instruction ID: b34c34e9ec7d33e9be602ed61c76b77e86980fe9c98df094597d73effc5488e7
                                  • Opcode Fuzzy Hash: 684f012e7229e96e008fa0c48169108c70c09cc9530de442a91312e16c4f4309
                                  • Instruction Fuzzy Hash: 96115BB0705221DFE7244A19CC05BAE376BDBC2B11F9A84A7E4059F3A1C674D893D719
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6397986a0d4e9b750c313ee2547ae61193194743b0dc59838130335c1cbe295
                                  • Instruction ID: b4f9b44719748691160eff5b9af0e29fa2bbe70c3adc86200de1ece676f776b7
                                  • Opcode Fuzzy Hash: c6397986a0d4e9b750c313ee2547ae61193194743b0dc59838130335c1cbe295
                                  • Instruction Fuzzy Hash: 8521C0B0D01268DFDB20DF9AC588BDEBFF5AB08714F64845AE408BB240C7B55895CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45be943a5f28687512d99fb8f2d14b86c9ad257b2e78b2cef3989bad975f29de
                                  • Instruction ID: e9f523299da59f2056e8cf0401d1de4df3d629e8fe8bc9a710ed6c0bff7b704b
                                  • Opcode Fuzzy Hash: 45be943a5f28687512d99fb8f2d14b86c9ad257b2e78b2cef3989bad975f29de
                                  • Instruction Fuzzy Hash: 6F21DFB0D01268DFDB20DF9AC588BDEBFF5AB48314F64845AE408BB240C7B55895CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f89ce3e63d0347e573e3f8018c8ba3dc04e16ceed2301465c308cb24a50acf2b
                                  • Instruction ID: 72524c368870c17cb82d00ef23d7bb5d79b53e6af4ed24a3bc1ffdf0aef0b573
                                  • Opcode Fuzzy Hash: f89ce3e63d0347e573e3f8018c8ba3dc04e16ceed2301465c308cb24a50acf2b
                                  • Instruction Fuzzy Hash: 8821F8B4A01229CFDB10DF98C544A8EFBF1EF09316F85D196D8099B312C7309996DF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d412b72386979f851ef4b52c2d79cd738dc45e57ce1310c2910a6e58a624e0ec
                                  • Instruction ID: 8ce332539dbfcb15541e80ec3763a6043438baeb1b8f8d15efea486a71177ddf
                                  • Opcode Fuzzy Hash: d412b72386979f851ef4b52c2d79cd738dc45e57ce1310c2910a6e58a624e0ec
                                  • Instruction Fuzzy Hash: 9D21A2B4A10908DFC714CF5AE099999BFF1FF88310F5281D5E8889B366DB31E9A1CB15
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d8432c5d8fbcc823594d40bbbece25b9af30de53366f8dc68c01c225ddda3a6
                                  • Instruction ID: 15ad3ab8e1257248e3d6e998caea416606ef5bd34eb3818b2cc9c93f632e2e4a
                                  • Opcode Fuzzy Hash: 2d8432c5d8fbcc823594d40bbbece25b9af30de53366f8dc68c01c225ddda3a6
                                  • Instruction Fuzzy Hash: 5A21F8B4A02229CFC710DF98C284A9EFBF2BF49316F95D596D8095B202C730E996CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4eb6376b493404a44fc5ceb0eb7dca75b081478c109343a67c9088960ded22e
                                  • Instruction ID: b698579d6ef78ebcae6bcddb6a8f93edc4de2f384a8d86b1c9d95dc5046e5f8b
                                  • Opcode Fuzzy Hash: e4eb6376b493404a44fc5ceb0eb7dca75b081478c109343a67c9088960ded22e
                                  • Instruction Fuzzy Hash: 57213EB0A40258CFCB54EF28E946B997BB6FF85301F1081A6E84DA7719DB344D86CF01
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d80e17f1780dcadfb93573c61ce9c7fc1a49ba823341687af5786d4717c111e
                                  • Instruction ID: 0a6eccce5cb5f4d9f72adb01c4ea525d4c134429851b3912f102ad0946169028
                                  • Opcode Fuzzy Hash: 3d80e17f1780dcadfb93573c61ce9c7fc1a49ba823341687af5786d4717c111e
                                  • Instruction Fuzzy Hash: 9821C5F4E14219CFCB80CFA9C1819EEBBF5EB49300F609456D809A7711E770AA52DF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065214708.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10ed000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                                  • Instruction ID: 5a3548218dd4d391bd979e90493a3567f948dca096b18cef0edd49c163f0bd52
                                  • Opcode Fuzzy Hash: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                                  • Instruction Fuzzy Hash: F521A276504284DFDB06CF54D9C4B16BFB2FB88314F24C6E9D9490B256C33AD416DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7633ad87f91a0b2dc3dc701ce3c8e7e1cad23dc34ccacf985881a61012f5d589
                                  • Instruction ID: c61a70ce28c9d24247565ce91b76df7ed245f0070a755e64fcad8895dead481a
                                  • Opcode Fuzzy Hash: 7633ad87f91a0b2dc3dc701ce3c8e7e1cad23dc34ccacf985881a61012f5d589
                                  • Instruction Fuzzy Hash: 951158F09082199FCB05CF99C5809EDBFF9EB4A320F509A96D4589B316E7709A53DB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7930928a3cf0f1deb8baf3039dd501b68fb3f96a44ce5217511e8badeb285801
                                  • Instruction ID: f68d08b949acc9b1526e274ac8fb939b20acde2129bb9c2df588192c6cf3f0cb
                                  • Opcode Fuzzy Hash: 7930928a3cf0f1deb8baf3039dd501b68fb3f96a44ce5217511e8badeb285801
                                  • Instruction Fuzzy Hash: 8E11C2B5B002564F8B21DB7998488BFBBF6EFC8260715496AE46DE7340EF30AD05C760
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cbcfdc53af6ed63dcd8cb3917a40b5689569eacf6faf3ed4c9873868ce7db002
                                  • Instruction ID: 681c6dda1eba85b752bab83862b8951b6c402f61a2d46c1fab1d6f25ff8823b3
                                  • Opcode Fuzzy Hash: cbcfdc53af6ed63dcd8cb3917a40b5689569eacf6faf3ed4c9873868ce7db002
                                  • Instruction Fuzzy Hash: 3C11E1B5928108EFC700DFA4D9849EEBFF9EF4A300F148496E8099B312D6319E12EB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d9b051a6cdd35d6d6608d6f34ec3139040ac91832c5ab5e48f55fc4ea7ed6ec
                                  • Instruction ID: 73d2c41d18f8e45dad14a5881e5d07c7af6101f7df60be4b8034c9bda8e5cbc3
                                  • Opcode Fuzzy Hash: 6d9b051a6cdd35d6d6608d6f34ec3139040ac91832c5ab5e48f55fc4ea7ed6ec
                                  • Instruction Fuzzy Hash: 812103B5D002599FCB10DF9AD884ADEBBF4FB49310F50881AEA19A7310C379A955CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fe74d3e04bb192a9d98a1ac443a3791fe76ea718dbf46cdd3cca741890622809
                                  • Instruction ID: 0c9d9c6a98a767c60f36291b2f585fb21412f29d7ba9bc5999131f39839f943e
                                  • Opcode Fuzzy Hash: fe74d3e04bb192a9d98a1ac443a3791fe76ea718dbf46cdd3cca741890622809
                                  • Instruction Fuzzy Hash: 2D21E7B1D146588BEB18CFABC8557DEFFB6AF89300F04C06AD5086B254DB791946CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065262178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10fd000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction ID: 144f5005dc5ac2c43c660d58ba07b957dd708e9990ecafe78a01fe8a1fc49c83
                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction Fuzzy Hash: 6211DD75504280CFDB02CF58D5C4B15BFB2FB84314F24C6AEDA894B656C33AD40ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065262178.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10fd000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction ID: a307fca5768906321e53a098932bdbba624da7378b95e9cc8c2871d83360fe43
                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction Fuzzy Hash: D211D075504280CFDB16CF54D5C4B15FFA2FB84314F24C6AEE9494B656C33AD40ACB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8403d343fed5d9c9d626534c0202b728c9c2e1153a02f2be61d3336f124bf65b
                                  • Instruction ID: c1c4ce1fb1ee032716665fcad1bd0395447b195f9a87a5910ae39f2c996c9f53
                                  • Opcode Fuzzy Hash: 8403d343fed5d9c9d626534c0202b728c9c2e1153a02f2be61d3336f124bf65b
                                  • Instruction Fuzzy Hash: D11121B0E14114DBD704CF59C490AEDFBB9FF49300F55D5A6D80997391D730AA92DB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d596b197075789053df86d10b95675c29cfd074c6db1717c7c35ea663f33af6
                                  • Instruction ID: 7bba04b1c918facb11e109b71ff7822041e3458dd0af1a4d8feb603d4286272f
                                  • Opcode Fuzzy Hash: 5d596b197075789053df86d10b95675c29cfd074c6db1717c7c35ea663f33af6
                                  • Instruction Fuzzy Hash: 3B1190B1D106189BEB18CFABC8457DEFAB6AF88300F04C46AD50966254DBB51946CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92455d3c4cb4964282cef6a69141cb6fcf1f398605a641cb453bb1936334f8ff
                                  • Instruction ID: a9b4fc969e442c3b1b0de676888a226baec00cdbadb0d3cbac1beea48a75cd4a
                                  • Opcode Fuzzy Hash: 92455d3c4cb4964282cef6a69141cb6fcf1f398605a641cb453bb1936334f8ff
                                  • Instruction Fuzzy Hash: 8D1106B0D18219DFCB44DFA9C5409EDBBF9EB49310F4099969418A7315E770AA52DF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065214708.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10ed000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7f8c024577f80d69b062d748b3c18d057c722309558fafc899d65a1264427786
                                  • Instruction ID: 59aea4ec1aacfa61be3cabf3731eb1de1ba4e03c3a3ece8ef226d4b772173488
                                  • Opcode Fuzzy Hash: 7f8c024577f80d69b062d748b3c18d057c722309558fafc899d65a1264427786
                                  • Instruction Fuzzy Hash: 0A01A7711043449EE7118E6BCD88B6BBFD9EF86324F18C46AED994A286C2799840C771
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c2ce7f67b05fded09d86d155381ee7d3048c5b309e5fc78a2f0311f8cbf32f5d
                                  • Instruction ID: fbc7e50bee3981119008c3c3cbfd9391be25fa1623af380c44306af381cd150b
                                  • Opcode Fuzzy Hash: c2ce7f67b05fded09d86d155381ee7d3048c5b309e5fc78a2f0311f8cbf32f5d
                                  • Instruction Fuzzy Hash: 07012874A24108EFCB04DFA8C584AADBFF5AF49300F54D495E8089B311DA31EE12EF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c2ad4ac26bc77938c1106a786929f491d6bbd672dbcbe3463ab0e7d0702b10d
                                  • Instruction ID: edb42cd9eca3dd35c5e58b93f0dafbe83f12a6170fb2e3c62a7b5502eed8109f
                                  • Opcode Fuzzy Hash: 3c2ad4ac26bc77938c1106a786929f491d6bbd672dbcbe3463ab0e7d0702b10d
                                  • Instruction Fuzzy Hash: C7F0FFF012A258DFC716CBB0D4022E93F34DB02211F40858EE80843242DE365A63DB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27cc8dfc3454d3aa8d64fe3a22b3d3c460679f4a619333bff3cdb06df24ba5ac
                                  • Instruction ID: 9e4bb15193604de61961574f01fad6f6b09d5e80934b262eed10e30e41512892
                                  • Opcode Fuzzy Hash: 27cc8dfc3454d3aa8d64fe3a22b3d3c460679f4a619333bff3cdb06df24ba5ac
                                  • Instruction Fuzzy Hash: 5401D675A00208AFC704DFA9C585A9DBFF1EB88210F05C1A5E808DB361DB35E941DF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a0cc017ed27f15ccb309b0443e18e9cc369ada44bbe251843019b511486f0dae
                                  • Instruction ID: efd060f4e68da2aad739e9aa16c9b5bf49c935867aad9f851064953c4ed99de6
                                  • Opcode Fuzzy Hash: a0cc017ed27f15ccb309b0443e18e9cc369ada44bbe251843019b511486f0dae
                                  • Instruction Fuzzy Hash: 9FF0C8B0928218DBDB04CF55D5809EDBFB8AF4A300F80D5A6D4195B212DB709E17EFB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2065214708.00000000010ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 010ED000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_10ed000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2752f82ef363c587a6913c441559c963d8d47e59fd4697458a151159b4c13608
                                  • Instruction ID: 3f63e92cf53b7e13e68c5c221328e5084d026498c4b894f4be1418b56799f2e2
                                  • Opcode Fuzzy Hash: 2752f82ef363c587a6913c441559c963d8d47e59fd4697458a151159b4c13608
                                  • Instruction Fuzzy Hash: 79F062714043449EE7118A1ACD88BA6FFE8EF86624F18C55AED884B286C2799844CB71
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 77d6ee344b29cbb2c663413d80331a66cb218f2df09be0989f52981895f41a7e
                                  • Instruction ID: bd8f7c32e5ba4a352b9efed5d8834906935534a0bbbdd69a476042bb0e2efee7
                                  • Opcode Fuzzy Hash: 77d6ee344b29cbb2c663413d80331a66cb218f2df09be0989f52981895f41a7e
                                  • Instruction Fuzzy Hash: 5601ECB0C00229DFDB14DF5AC4483EEBEF5FF44360F548566E828AA290D7744AA5DF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 194ba0d5c98c70c4d32b26589ee73b219cd52906aeb39fb310771db0538fb434
                                  • Instruction ID: 4454a29d1343c3ced405267d9ca48d91838a4ddf15dc6399d58e45d00ea4e333
                                  • Opcode Fuzzy Hash: 194ba0d5c98c70c4d32b26589ee73b219cd52906aeb39fb310771db0538fb434
                                  • Instruction Fuzzy Hash: 7DF01271B042156F93049B6ADC88E6BBBEEFBC96647518579E508D7320DA319C05C7A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 054ad3a172b00dcf28d018e86595e9e65c391bdc90babcc3bc1b1de740570649
                                  • Instruction ID: d43b81eef4aacef13bec7b2155b7fc4893fedcc774a9f0c3469966d54e31e516
                                  • Opcode Fuzzy Hash: 054ad3a172b00dcf28d018e86595e9e65c391bdc90babcc3bc1b1de740570649
                                  • Instruction Fuzzy Hash: 3B01AF74A01208AFCB04DFA9C589A9DBFF1AF88200F05C1A9E8089B361DB31E951DF41
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d721bd7d4d43a797ddc4e447150738ea3f96f6e58c1ad9e1b44b5494a383f971
                                  • Instruction ID: d2826247a645027430b1baccf39b08b937cde6ef0075530cbed80d86cba26cc3
                                  • Opcode Fuzzy Hash: d721bd7d4d43a797ddc4e447150738ea3f96f6e58c1ad9e1b44b5494a383f971
                                  • Instruction Fuzzy Hash: E801FFB0C00229DFDB14DF5AC4043EEBEF1FF44360F548566E824AA290D7744A51DF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 982f7300c25244738ef9ce31cefe7ff1597054ff2c49dddb55033a81aa3bb893
                                  • Instruction ID: fade740c6c34c92581e6a94183179019b00b9a47dae5094453c50d6f95096a6e
                                  • Opcode Fuzzy Hash: 982f7300c25244738ef9ce31cefe7ff1597054ff2c49dddb55033a81aa3bb893
                                  • Instruction Fuzzy Hash: BEF0E2B3600004AFEB04DFA8DC01F9E7BBADF98210F04816AE104E3360E231D9109B40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 392783bfb4f61e259a1accdebc72ec6cdf1610a68e34f85011ea12bb7bdbe64a
                                  • Instruction ID: 912040e4a199f1d18728e1009df7cdf8b92c7ad2e14e4f9c6d7eb110d6acf078
                                  • Opcode Fuzzy Hash: 392783bfb4f61e259a1accdebc72ec6cdf1610a68e34f85011ea12bb7bdbe64a
                                  • Instruction Fuzzy Hash: 37E039727001286F93089AAED884C6BBBEEFBCC660361807AE508CB310DA319C01C6A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d7c66b1281e7c99af65ca941a1f29d901b713e1775db143d463e6ad1b0be771
                                  • Instruction ID: 5ffc50d9d0fadd357b772ae0f99110f159d2f0ac82087cb506a41509271d7894
                                  • Opcode Fuzzy Hash: 3d7c66b1281e7c99af65ca941a1f29d901b713e1775db143d463e6ad1b0be771
                                  • Instruction Fuzzy Hash: EEE092B08093089FDB118FA0A4450E97F74EB02242F5142EAE48553252DA369A56DBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f481d70b357d6b48f5008a2b177dfbbd32b5d4989feae9b106040d2be733ef9d
                                  • Instruction ID: 2c5dd81017f7136b58d3f08c7779a1ed06c532323f2b1bbeda22218301d2641b
                                  • Opcode Fuzzy Hash: f481d70b357d6b48f5008a2b177dfbbd32b5d4989feae9b106040d2be733ef9d
                                  • Instruction Fuzzy Hash: 37F06D70904248EFCB02EFA8D44878DBFB1AB48310F00C1DAA84897291C6795A54DF01
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 262a409fe632462983afbd90e7789a8b9b7fcbbe6df114f61267f072aa5650e7
                                  • Instruction ID: 484ef68d8297881970da9a6872d7def6a9ce8af7ca5c79b3d7a92eccca539b9a
                                  • Opcode Fuzzy Hash: 262a409fe632462983afbd90e7789a8b9b7fcbbe6df114f61267f072aa5650e7
                                  • Instruction Fuzzy Hash: 1AE01AB08192489FD752EBF8A5066DC7FB0DB09212F1041E6DC45D3352EAB45BA6CBA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca188a07723e067792c4cb5f95670a02c75d13edd46b0788dcda904bdfa13fb4
                                  • Instruction ID: 273cd881da0388f84658b1ac3eb02f05ed0950164779a122b1a6c358ee9b1e72
                                  • Opcode Fuzzy Hash: ca188a07723e067792c4cb5f95670a02c75d13edd46b0788dcda904bdfa13fb4
                                  • Instruction Fuzzy Hash: ACF03974D0020CEFCB41EFA9D8096CDBBB1EB88311F50C0AAA81893350DA756A65DF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f200544d772e0a6a42dcc4fd1c22afec704752c11e09cbae6780b57ad356a5f2
                                  • Instruction ID: 1f27c56ca4f555bb15be9e14bc17d754a1795d7a334fd775710c0922cc30c019
                                  • Opcode Fuzzy Hash: f200544d772e0a6a42dcc4fd1c22afec704752c11e09cbae6780b57ad356a5f2
                                  • Instruction Fuzzy Hash: 8EE08C7101A344DFC327CB7898195EA7F3AEB03202F0640DAE004972A2DA775A54DBB2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8841afd1727af7c5f5b89f2452ea83a52689a7e385dd2a569b40975873b82562
                                  • Instruction ID: d7c4d96c13f2db0b9db7e2420423415930a806f906bbe194b85a23d10d5f5cb0
                                  • Opcode Fuzzy Hash: 8841afd1727af7c5f5b89f2452ea83a52689a7e385dd2a569b40975873b82562
                                  • Instruction Fuzzy Hash: BEF0FA74916328CFCBA5DF64D984AD9BBB1FB19305F5006DAE809A7210DB30AE92CF10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dba16c30e5a9068c77a8bc89ae334d919c0d5efae4841ada03cde22bff6c3925
                                  • Instruction ID: dd4ae6cf18d128f3fe06c0a68291e56112457d933c3d1f6c5beb4770b46602c7
                                  • Opcode Fuzzy Hash: dba16c30e5a9068c77a8bc89ae334d919c0d5efae4841ada03cde22bff6c3925
                                  • Instruction Fuzzy Hash: 46E06578A252188FDB60CF88C58088DBBF1FF89310F65D091E415AB229CB30FA81CF20
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd3019bb087f7de214ca370564770844a2c720c7a55bd2d3c4b99eb4a4d9a58e
                                  • Instruction ID: 7c8cc2f2f8881523cf318851b466d66038f518878fb7a76ab6376a4c908af0ff
                                  • Opcode Fuzzy Hash: fd3019bb087f7de214ca370564770844a2c720c7a55bd2d3c4b99eb4a4d9a58e
                                  • Instruction Fuzzy Hash: 0BF0A0B0A00394CFDB10EF28E845B99B7B6FF44301F024296A80DA3714DB344E45CF81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03e47b0ffaac800c5dcdbe6b06f8341e9899e9352aa4ec11bfe5b5df938a62e4
                                  • Instruction ID: edcedbb0ee516bfed0056a2df2f29d921f3697d5c97a39b6d8466bb19663c7e7
                                  • Opcode Fuzzy Hash: 03e47b0ffaac800c5dcdbe6b06f8341e9899e9352aa4ec11bfe5b5df938a62e4
                                  • Instruction Fuzzy Hash: E7E046B0526354CFC728CBA1D0458987FB2FF4A341BA0149AE002EB634CB35E893CE21
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68431bfe2130c9c5e105e5876d5010181b101384883dec1bd1be095390583798
                                  • Instruction ID: 2a4529141d09edfb0fbc28e7a75ac220be4334e49c0782e8a31fb56c21e907c7
                                  • Opcode Fuzzy Hash: 68431bfe2130c9c5e105e5876d5010181b101384883dec1bd1be095390583798
                                  • Instruction Fuzzy Hash: ECE01A74E0025C8FCB00DF94D849A9CBBF5FB45314F10422AD819AB788DB346C06CF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 938e00f32951afd876997dba214f913536b10f6fd9440d92dc0763c47bd97804
                                  • Instruction ID: 24226cd78c21f0679760bffcbf0cfa1f333df8591c231461249fd2279886c15f
                                  • Opcode Fuzzy Hash: 938e00f32951afd876997dba214f913536b10f6fd9440d92dc0763c47bd97804
                                  • Instruction Fuzzy Hash: FEE012B0D11208DFCB50EFB8D54669DBFF4EB08301F5040A9D80493340EA756A50DF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b7f49d29deccd933a49140aaaaeb6a785c7d1ab66a5f1d487ab98c1fe04d9171
                                  • Instruction ID: a63749086ba49fe2990a518b281021354e53389de293f960e69a444682fc97be
                                  • Opcode Fuzzy Hash: b7f49d29deccd933a49140aaaaeb6a785c7d1ab66a5f1d487ab98c1fe04d9171
                                  • Instruction Fuzzy Hash: 37E0C270922314CFCB64DFA1C449589BB70FF45340B1010AAE816DF27CC7369982CF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26eb705e44a3a23df94372ccd4f648713177c593c387bffc9c55ba00018324e7
                                  • Instruction ID: 6138955ef36b363eb5c1bf48ca7b88472f893ead52bbe02f9fb03d02ac431423
                                  • Opcode Fuzzy Hash: 26eb705e44a3a23df94372ccd4f648713177c593c387bffc9c55ba00018324e7
                                  • Instruction Fuzzy Hash: F4D095B1E16068CEC700EAE4D1843EC7BF4EF46304F105496CC01D5300C17488474A00
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84a88b6f062bbea34d32e79103e54ff7c14df8434d21cdd4518bdb6ada3bec11
                                  • Instruction ID: 8f260ef7c15708b13091ded0d46c70670ec71c5e69c02515d201826c8e669f5e
                                  • Opcode Fuzzy Hash: 84a88b6f062bbea34d32e79103e54ff7c14df8434d21cdd4518bdb6ada3bec11
                                  • Instruction Fuzzy Hash: AED017B0911208EBCB14DFB4E50659DBFB4EB45302F5081ADE80823340DB766A91EFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04cc9a1df9fb62de9ed3d082f23e592efe4124730b3486c02e222747c508efe4
                                  • Instruction ID: 9616369c902ecd15d4260cda30efc48f334ef3135175ca68fac197d7ef26b1b0
                                  • Opcode Fuzzy Hash: 04cc9a1df9fb62de9ed3d082f23e592efe4124730b3486c02e222747c508efe4
                                  • Instruction Fuzzy Hash: 22D0A7714192414FC3217B78A80E260BF747B02205F444196FC8892152DFE95865CFA6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9698d8c5321b56735485ecb21f80191e29af8f55c9836c96185cbcf26b50f0de
                                  • Instruction ID: 53e0e4d2eed4e1cae464ac53349f3f2db9927315baa7553773a2a15ea23d06e1
                                  • Opcode Fuzzy Hash: 9698d8c5321b56735485ecb21f80191e29af8f55c9836c96185cbcf26b50f0de
                                  • Instruction Fuzzy Hash: E8D0A9B0412208DFC725CBB8D40669E7B3AEB02302F4000A8E40803280CF72AA50DFA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a30e6be98ad7f0196a1ed517a15351955d953088228f4ffb9c4845f40c92859
                                  • Instruction ID: d2102075d6bbb3819d24e8c6ea3317f4057508cb3aec6656351d8bad0b6872f5
                                  • Opcode Fuzzy Hash: 4a30e6be98ad7f0196a1ed517a15351955d953088228f4ffb9c4845f40c92859
                                  • Instruction Fuzzy Hash: E3D09E70114221CFC3248B60C5949A8BB7ABF0B306F4158DAE80A57251CF31E942CF30
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06c115806ddf10faab8676bb9302a5a60c80f53124c23d1a21ce51600faa8a4c
                                  • Instruction ID: 3e678141c4760e32c7a18a934aa954c790cdc4af6155358d42b7c034ebfca301
                                  • Opcode Fuzzy Hash: 06c115806ddf10faab8676bb9302a5a60c80f53124c23d1a21ce51600faa8a4c
                                  • Instruction Fuzzy Hash: 41C08C710212048BD2207BA8E80E3647A686B01202F804010B84882450CFE664A2CE66
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f887d46ec5918daf77704e5996732a2848b8f066061d7a552d5aba18b89c95d4
                                  • Instruction ID: 99868642e5325ce9941d492e8e7508195a764aac3f8755dcad68dcaeb35e5667
                                  • Opcode Fuzzy Hash: f887d46ec5918daf77704e5996732a2848b8f066061d7a552d5aba18b89c95d4
                                  • Instruction Fuzzy Hash: 91B092F6220511DAE608AA22D40A78529509BF2304FA6802A6A0541944CD66A07A9A27
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: T+-q$[V~*$[V~*$]\`
                                  • API String ID: 0-1849991408
                                  • Opcode ID: f4b59c6be64cc1c79db16f817c3ed15982ebd60d8b13e664b12bcceb931d4e85
                                  • Instruction ID: 16edde2e0f2736447cdc4ad589056c964b245dbb491ff0c515997919759ac0e1
                                  • Opcode Fuzzy Hash: f4b59c6be64cc1c79db16f817c3ed15982ebd60d8b13e664b12bcceb931d4e85
                                  • Instruction Fuzzy Hash: 4AB106B0E15229DBDB04CFAAD9808EEFBF6BF89300F54D52AD415AB258D3309942CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: T+-q$[V~*$]\`
                                  • API String ID: 0-3978741314
                                  • Opcode ID: 71b4636060a2933ef4920bbb84431900ee9428b73715b819d5086fc9695d3c6e
                                  • Instruction ID: ac230f5bc23f805cb1ee9bac371e06b71a7ce22bc39fb72847c2c31dbace32c5
                                  • Opcode Fuzzy Hash: 71b4636060a2933ef4920bbb84431900ee9428b73715b819d5086fc9695d3c6e
                                  • Instruction Fuzzy Hash: 4FB108B4E15219DBDB04CFAAD9804EEFBF6BF89300F54D52AD415AB258D3309942CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: T+-q$[V~*$]\`
                                  • API String ID: 0-3978741314
                                  • Opcode ID: f70c26172bb8254cfaf666d50b37d3c69a1852ad12f8e88c65316aed97f37920
                                  • Instruction ID: 5fc5ced66f744e92e51c2907e81ec11bd0c377de5bf80119dd54092d7963d034
                                  • Opcode Fuzzy Hash: f70c26172bb8254cfaf666d50b37d3c69a1852ad12f8e88c65316aed97f37920
                                  • Instruction Fuzzy Hash: BD9107B4E25229DF8B04CFA9D9808EEFBB6BF89300F54D916D415A7258D3309952CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 873b659a22c5947e56eff706b4855ffe71036d8197ffbd581c1d3ba9b95ab1d1
                                  • Instruction ID: 943f629f512570c0cd92d1f6795b7e8b614c8feb547b03eb3f5c6ed7a0a95199
                                  • Opcode Fuzzy Hash: 873b659a22c5947e56eff706b4855ffe71036d8197ffbd581c1d3ba9b95ab1d1
                                  • Instruction Fuzzy Hash: BDE1E6B4E001198BCB14CFA9C5809AEFBB2BF89305F64816AD814AB355D735AD46CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 11d76b91324a7844505b8ae63be5c9601e9051d0fc743bb744ef76cc6c6a367e
                                  • Instruction ID: 69d29380c6da6ff2a9ca7037117232a715f3b6cd96e6f020173bd2f142fb9ffb
                                  • Opcode Fuzzy Hash: 11d76b91324a7844505b8ae63be5c9601e9051d0fc743bb744ef76cc6c6a367e
                                  • Instruction Fuzzy Hash: 51E10AB4E001298FCB14CFA9C5849AEBBF2FF49305F64816AD814AB355D735AD46CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7c99a6efd4bc30b6a144e8957cff60ebccb5644b42d7d43d6f1d4aa6d3c6a8b
                                  • Instruction ID: d29e2ed6e1f6bd896b2c3f0632ddeb03a99be24d687e1cbcf6958e15c7d2d35a
                                  • Opcode Fuzzy Hash: f7c99a6efd4bc30b6a144e8957cff60ebccb5644b42d7d43d6f1d4aa6d3c6a8b
                                  • Instruction Fuzzy Hash: 8EE1E9B4E002198FDB14CFA9C5809AEBBF2FF49305F248169D814A7356D735AD45CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2c8edd794d62f0ea886fdd58853abc6f4287288a7dfb809ae6ea277919796db1
                                  • Instruction ID: c894555338fa13b5ecfad135ebe26c23a35f441a3851e895743516896d9ef74b
                                  • Opcode Fuzzy Hash: 2c8edd794d62f0ea886fdd58853abc6f4287288a7dfb809ae6ea277919796db1
                                  • Instruction Fuzzy Hash: D7E1E9B4E00219CFCB14CFA9C5809AEBBF2FF89305F248169D854AB356D734A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070920536.00000000078C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 078C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_78c0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4565852f599f93ed06e7015ee87ea47ed9679c01114feda4cf848158bf5928a
                                  • Instruction ID: e2429bf48d5343a3753ed20c42e58dae0d7ffe730ffd3f78b7a59fbc20f6ecb5
                                  • Opcode Fuzzy Hash: d4565852f599f93ed06e7015ee87ea47ed9679c01114feda4cf848158bf5928a
                                  • Instruction Fuzzy Hash: 75E1E5B4E001198FCB14DFA9C5849AEBBF2FF89305F248169D858AB356D734AD45CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 719d9ce066cadebca36135efd4053325c9c2eb555a057b8093383756e25bf303
                                  • Instruction ID: 8c21604d747309c07524fdf53a26c142257f7bc21ee94f7b10cf54c6633027a5
                                  • Opcode Fuzzy Hash: 719d9ce066cadebca36135efd4053325c9c2eb555a057b8093383756e25bf303
                                  • Instruction Fuzzy Hash: D9D1E831C1075A8ACB11EFA4D994A9DF7B1FF95300F1097AAE4497B210EB706AC9CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7a7aef258ab95990891b93f8fe391278117f26bf21ec04f218c4b6334cec111f
                                  • Instruction ID: db4f9aeb5762b8ccaac30c16752f7464b70bf2c83584a5787679e885ab7beaef
                                  • Opcode Fuzzy Hash: 7a7aef258ab95990891b93f8fe391278117f26bf21ec04f218c4b6334cec111f
                                  • Instruction Fuzzy Hash: 8DD1E831C1075A8ACB11EFA4D994A9DF7B1FF95300F1097AAE4493B210EF746AC9CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 010adc37da35eaf81f0300d07aa48ff46a66439721d25e9c683bcc7aa97e0d61
                                  • Instruction ID: 1a8f22d1158c9c0ba7723caaf920755b893aa449a7b3d9fedb18e119a1a32aa8
                                  • Opcode Fuzzy Hash: 010adc37da35eaf81f0300d07aa48ff46a66439721d25e9c683bcc7aa97e0d61
                                  • Instruction Fuzzy Hash: D781EFB4E10219DFCB44CFA9C98499EFBF2FF89210F14955AE415AB320D730AA52CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 315ecdaae9f4267274b788a26bbca19f2ee29df1df69c56899ef4cf2bb3a3796
                                  • Instruction ID: 2e41453e1d5897c857889ef9e13cf360de37dab33b1313f4e634b6528195e96b
                                  • Opcode Fuzzy Hash: 315ecdaae9f4267274b788a26bbca19f2ee29df1df69c56899ef4cf2bb3a3796
                                  • Instruction Fuzzy Hash: 6F81E074E10219DFCB44CFA9C98499EFBF2FF89210F54956AE415AB320D730AA52CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3602e6fb5d3e218eb4c0ec97a3408787d6d39ee57eb77f4ccf4cf1cf242dbd8
                                  • Instruction ID: f634c1adbc22b176151c78bb37ae73bec1b736596cf65d107c84b3f3b9b2ab0b
                                  • Opcode Fuzzy Hash: c3602e6fb5d3e218eb4c0ec97a3408787d6d39ee57eb77f4ccf4cf1cf242dbd8
                                  • Instruction Fuzzy Hash: E77105B0921605EFC750CF90E15A198BFB1FB89300F619899C089D7145DF3C9673DB28
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d51afa2f026bc1139d5ecca91a3e302287165cf1d4c915d1b072143e7c46ff1
                                  • Instruction ID: 530822797018e5264636ce9a3e6da6b5715ed38fe552173783e1e5c3f02af260
                                  • Opcode Fuzzy Hash: 8d51afa2f026bc1139d5ecca91a3e302287165cf1d4c915d1b072143e7c46ff1
                                  • Instruction Fuzzy Hash: 256147B1E1421ADFCB04DFAAC9815EEFBB2BF89300F55841AD425A7310D374AA52DF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2758863cad84c7fa616dc2eccb5e9cb996902e82ecadabaeca04f232b4df36c
                                  • Instruction ID: d036152716217abe6bcdbcb21712239e5326e3cb36fbc46f579d8b29ad921527
                                  • Opcode Fuzzy Hash: e2758863cad84c7fa616dc2eccb5e9cb996902e82ecadabaeca04f232b4df36c
                                  • Instruction Fuzzy Hash: AE5138B1E1421ADFCB04DFAAC9815EEFBB2BF89300F54C41AD425A7210D774AA52DF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf50204b2b2a50997d07d945fbae8d57e7b33d255a1ca4c1e3a966724157bc85
                                  • Instruction ID: 6d88e86381b7a558b2de76c398b1a7f75c8006c3fb84015674fe907fe67ff7e6
                                  • Opcode Fuzzy Hash: cf50204b2b2a50997d07d945fbae8d57e7b33d255a1ca4c1e3a966724157bc85
                                  • Instruction Fuzzy Hash: 28511DB4D012298FDB14CFA9C5445AEBBF2EF89304F24C16AD818A7316D7359E46CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5cdc295b695675073c65cf2647b8c43c899729b2644a87605777488a50e54b9e
                                  • Instruction ID: ba0fd3f580c810e03f7e05a3c20aca94d0de229aaaf292424b323679bf9487ef
                                  • Opcode Fuzzy Hash: 5cdc295b695675073c65cf2647b8c43c899729b2644a87605777488a50e54b9e
                                  • Instruction Fuzzy Hash: 7A5136B0E1525ADBDB04CFAAD4415EEFBF2EF89310F20982AE401A3354DB345A528F94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 234fe14e305157c3dd4c1ce246d0eb73709f3533e7f26dc88dcf31ff4a721806
                                  • Instruction ID: a2cba4238f5462c8457e02daaed9073eea354dacdbe4903943225bb638a37982
                                  • Opcode Fuzzy Hash: 234fe14e305157c3dd4c1ce246d0eb73709f3533e7f26dc88dcf31ff4a721806
                                  • Instruction Fuzzy Hash: BD51FAB4E002198BDB14CFA9C5805AEFBF2FF89305F64816AD818A7316D7359D46CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18d6a41a2321261818db23d52ce5595d44ea21b5246803728b1a636cc5cf1a03
                                  • Instruction ID: b75600008353e16861800b9d96b0e834eb7e3541437f2c79958826cf5781f54e
                                  • Opcode Fuzzy Hash: 18d6a41a2321261818db23d52ce5595d44ea21b5246803728b1a636cc5cf1a03
                                  • Instruction Fuzzy Hash: CC41D4B0E1521ADBCB08CFAAC4815EEFBB2BF89300F54D56AC415B7205D7389A528F64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.2070763012.0000000007420000.00000040.00000800.00020000.00000000.sdmp, Offset: 07420000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7420000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ef47e27a745822cbe74b227f1ece16ef31fa5e262d01382afef6041c55f4907d
                                  • Instruction ID: a53e1b4f2e46ae76e2a70d2fce93608bbd5a3a0f753548e98a8a58d58148a896
                                  • Opcode Fuzzy Hash: ef47e27a745822cbe74b227f1ece16ef31fa5e262d01382afef6041c55f4907d
                                  • Instruction Fuzzy Hash: C141E4B0E1521ADFDB08CFAAC4815EEFBB2BF88300F54D46AD415A7214D7389A528F64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:10.1%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:182
                                  Total number of Limit Nodes:19
                                  execution_graph 38063 1390848 38064 139084e 38063->38064 38065 139091b 38064->38065 38069 69e1cf0 38064->38069 38073 69e1d00 38064->38073 38077 1391383 38064->38077 38070 69e1d0f 38069->38070 38081 69e14d4 38070->38081 38074 69e1d0f 38073->38074 38075 69e14d4 4 API calls 38074->38075 38076 69e1d30 38075->38076 38076->38064 38078 139138a 38077->38078 38079 1391488 38078->38079 38198 1397eb8 38078->38198 38079->38064 38082 69e14df 38081->38082 38085 69e2c34 38082->38085 38084 69e36b6 38084->38084 38086 69e2c3f 38085->38086 38087 69e3ddc 38086->38087 38090 69e5a5e 38086->38090 38094 69e5a60 38086->38094 38087->38084 38092 69e5a60 38090->38092 38091 69e5aa5 38091->38087 38092->38091 38098 69e5c10 38092->38098 38095 69e5a81 38094->38095 38096 69e5aa5 38095->38096 38097 69e5c10 4 API calls 38095->38097 38096->38087 38097->38096 38100 69e5c1d 38098->38100 38099 69e5c56 38099->38091 38100->38099 38102 69e495c 38100->38102 38103 69e4967 38102->38103 38105 69e5cc8 38103->38105 38106 69e4990 38103->38106 38107 69e499b 38106->38107 38113 69e49a0 38107->38113 38109 69e5d37 38117 69eaf48 38109->38117 38125 69eaf60 38109->38125 38110 69e5d71 38110->38105 38116 69e49ab 38113->38116 38114 69e6ed8 38114->38109 38115 69e5a60 4 API calls 38115->38114 38116->38114 38116->38115 38118 69eaf60 38117->38118 38119 69eaf9d 38118->38119 38134 69eb1d8 38118->38134 38138 69eb1d6 38118->38138 38119->38110 38120 69eafdd 38143 69ec4d8 38120->38143 38152 69ec4c9 38120->38152 38127 69eaf91 38125->38127 38128 69eb091 38125->38128 38126 69eaf9d 38126->38110 38127->38126 38130 69eb1d8 3 API calls 38127->38130 38131 69eb1d6 3 API calls 38127->38131 38128->38110 38129 69eafdd 38132 69ec4d8 2 API calls 38129->38132 38133 69ec4c9 2 API calls 38129->38133 38130->38129 38131->38129 38132->38128 38133->38128 38161 69eb218 38134->38161 38170 69eb228 38134->38170 38135 69eb1e2 38135->38120 38139 69eb1d8 38138->38139 38141 69eb218 2 API calls 38139->38141 38142 69eb228 2 API calls 38139->38142 38140 69eb1e2 38140->38120 38141->38140 38142->38140 38144 69ec503 38143->38144 38179 69eca30 38144->38179 38184 69eca40 38144->38184 38145 69ec586 38146 69ec5b2 38145->38146 38147 69ea17c GetModuleHandleW 38145->38147 38146->38146 38148 69ec5f6 38147->38148 38149 69ed7b0 CreateWindowExW 38148->38149 38149->38146 38153 69ec4d8 38152->38153 38159 69eca30 GetModuleHandleW 38153->38159 38160 69eca40 GetModuleHandleW 38153->38160 38154 69ec586 38157 69ec5b2 38154->38157 38189 69ea17c 38154->38189 38159->38154 38160->38154 38162 69eb21d 38161->38162 38163 69ea17c GetModuleHandleW 38162->38163 38165 69eb25c 38162->38165 38164 69eb244 38163->38164 38164->38165 38169 69eb4b1 GetModuleHandleW 38164->38169 38165->38135 38166 69eb254 38166->38165 38167 69eb460 GetModuleHandleW 38166->38167 38168 69eb48d 38167->38168 38168->38135 38169->38166 38171 69eb239 38170->38171 38174 69eb25c 38170->38174 38172 69ea17c GetModuleHandleW 38171->38172 38173 69eb244 38172->38173 38173->38174 38178 69eb4b1 GetModuleHandleW 38173->38178 38174->38135 38175 69eb254 38175->38174 38176 69eb460 GetModuleHandleW 38175->38176 38177 69eb48d 38176->38177 38177->38135 38178->38175 38180 69eca40 38179->38180 38181 69ecaee 38180->38181 38182 69ecfb8 GetModuleHandleW 38180->38182 38183 69ecfa8 GetModuleHandleW 38180->38183 38182->38181 38183->38181 38185 69eca6d 38184->38185 38186 69ecaee 38185->38186 38187 69ecfb8 GetModuleHandleW 38185->38187 38188 69ecfa8 GetModuleHandleW 38185->38188 38187->38186 38188->38186 38190 69eb418 GetModuleHandleW 38189->38190 38192 69eb48d 38190->38192 38193 69ed7b0 38192->38193 38194 69ed7fe CreateWindowExW 38193->38194 38195 69ed7c6 38193->38195 38197 69ed934 38194->38197 38195->38157 38199 1397ec2 38198->38199 38200 1397edc 38199->38200 38203 69ffa50 38199->38203 38207 69ffa40 38199->38207 38200->38078 38205 69ffa65 38203->38205 38204 69ffc7a 38204->38200 38205->38204 38206 69ffc91 GlobalMemoryStatusEx 38205->38206 38206->38205 38208 69ffa65 38207->38208 38209 69ffc7a 38208->38209 38210 69ffc91 GlobalMemoryStatusEx 38208->38210 38209->38200 38210->38208 37991 107d044 37992 107d05c 37991->37992 37993 107d0b6 37992->37993 37999 69eda18 37992->37999 38004 69ecc44 37992->38004 38013 69ed9b7 37992->38013 38017 69ee718 37992->38017 38026 69ed9c8 37992->38026 38000 69eda07 37999->38000 38003 69eda26 37999->38003 38001 69ecc44 CallWindowProcW 38000->38001 38002 69eda0f 38001->38002 38002->37993 38003->37993 38007 69ecc4f 38004->38007 38005 69ee789 38046 69ecd6c 38005->38046 38007->38005 38008 69ee779 38007->38008 38030 69ee97c 38008->38030 38036 69ee8a0 38008->38036 38041 69ee8b0 38008->38041 38009 69ee787 38009->38009 38014 69ed9c5 38013->38014 38015 69eda0f 38014->38015 38016 69ecc44 CallWindowProcW 38014->38016 38015->37993 38016->38015 38019 69ee728 38017->38019 38018 69ee789 38020 69ecd6c CallWindowProcW 38018->38020 38019->38018 38021 69ee779 38019->38021 38022 69ee787 38020->38022 38023 69ee97c CallWindowProcW 38021->38023 38024 69ee8b0 CallWindowProcW 38021->38024 38025 69ee8a0 CallWindowProcW 38021->38025 38023->38022 38024->38022 38025->38022 38027 69ed9ee 38026->38027 38028 69eda0f 38027->38028 38029 69ecc44 CallWindowProcW 38027->38029 38028->37993 38029->38028 38031 69ee93a 38030->38031 38032 69ee98a 38030->38032 38050 69ee958 38031->38050 38054 69ee968 38031->38054 38033 69ee950 38033->38009 38038 69ee8ae 38036->38038 38037 69ee950 38037->38009 38039 69ee958 CallWindowProcW 38038->38039 38040 69ee968 CallWindowProcW 38038->38040 38039->38037 38040->38037 38042 69ee8c4 38041->38042 38044 69ee958 CallWindowProcW 38042->38044 38045 69ee968 CallWindowProcW 38042->38045 38043 69ee950 38043->38009 38044->38043 38045->38043 38047 69ecd77 38046->38047 38048 69efe6a CallWindowProcW 38047->38048 38049 69efe19 38047->38049 38048->38049 38049->38009 38051 69ee968 38050->38051 38052 69ee979 38051->38052 38057 69efda0 38051->38057 38052->38033 38055 69ee979 38054->38055 38056 69efda0 CallWindowProcW 38054->38056 38055->38033 38056->38055 38058 69efda9 38057->38058 38058->38058 38059 69ecd6c CallWindowProcW 38058->38059 38060 69efdba 38059->38060 38060->38052 38061 69e3050 DuplicateHandle 38062 69e30e6 38061->38062 38211 69eb680 38212 69eb6c8 LoadLibraryExW 38211->38212 38213 69eb6c2 38211->38213 38214 69eb6f9 38212->38214 38213->38212

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 654 69f3048-69f3069 655 69f306b-69f306e 654->655 656 69f380f-69f3812 655->656 657 69f3074-69f3093 655->657 658 69f3838-69f383a 656->658 659 69f3814-69f3833 656->659 666 69f30ac-69f30b6 657->666 667 69f3095-69f3098 657->667 661 69f383c 658->661 662 69f3841-69f3844 658->662 659->658 661->662 662->655 663 69f384a-69f3853 662->663 671 69f30bc-69f30cb 666->671 667->666 669 69f309a-69f30aa 667->669 669->671 780 69f30cd call 69f3868 671->780 781 69f30cd call 69f3861 671->781 673 69f30d2-69f30d7 674 69f30d9-69f30df 673->674 675 69f30e4-69f33c1 673->675 674->663 696 69f33c7-69f3476 675->696 697 69f3801-69f380e 675->697 706 69f349f 696->706 707 69f3478-69f349d 696->707 709 69f34a8-69f34bb 706->709 707->709 711 69f37e8-69f37f4 709->711 712 69f34c1-69f34e3 709->712 711->696 713 69f37fa 711->713 712->711 715 69f34e9-69f34f3 712->715 713->697 715->711 716 69f34f9-69f3504 715->716 716->711 717 69f350a-69f35e0 716->717 729 69f35ee-69f361e 717->729 730 69f35e2-69f35e4 717->730 734 69f362c-69f3638 729->734 735 69f3620-69f3622 729->735 730->729 736 69f363a-69f363e 734->736 737 69f3698-69f369c 734->737 735->734 736->737 738 69f3640-69f366a 736->738 739 69f37d9-69f37e2 737->739 740 69f36a2-69f36de 737->740 747 69f366c-69f366e 738->747 748 69f3678-69f3695 738->748 739->711 739->717 750 69f36ec-69f36fa 740->750 751 69f36e0-69f36e2 740->751 747->748 748->737 754 69f36fc-69f3707 750->754 755 69f3711-69f371c 750->755 751->750 754->755 760 69f3709 754->760 758 69f371e-69f3724 755->758 759 69f3734-69f3745 755->759 761 69f3728-69f372a 758->761 762 69f3726 758->762 764 69f375d-69f3769 759->764 765 69f3747-69f374d 759->765 760->755 761->759 762->759 769 69f376b-69f3771 764->769 770 69f3781-69f37d2 764->770 766 69f374f 765->766 767 69f3751-69f3753 765->767 766->764 767->764 771 69f3775-69f3777 769->771 772 69f3773 769->772 770->739 771->770 772->770 780->673 781->673
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-3723351465
                                  • Opcode ID: 32eb0ecc11062cd19dfb3ae66dc33571b2d4a9b52eba5cc0671b93d787ca11ec
                                  • Instruction ID: 9f2549070b7d6257112fb7bcb544b11739d6d2a36ad0524d048afcd331304645
                                  • Opcode Fuzzy Hash: 32eb0ecc11062cd19dfb3ae66dc33571b2d4a9b52eba5cc0671b93d787ca11ec
                                  • Instruction Fuzzy Hash: 24323F31E1061ACFCB15EF78C89459DB7B6BFC9300F61C66AD509A7264EB34E985CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1322 69f7d78-69f7d96 1323 69f7d98-69f7d9b 1322->1323 1324 69f7d9d-69f7dab 1323->1324 1325 69f7db2-69f7db5 1323->1325 1334 69f7e1e-69f7e34 1324->1334 1335 69f7dad 1324->1335 1326 69f7db7-69f7dc1 1325->1326 1327 69f7dc2-69f7dc5 1325->1327 1330 69f7dc7-69f7de1 1327->1330 1331 69f7de6-69f7de9 1327->1331 1330->1331 1332 69f7e0c-69f7e0e 1331->1332 1333 69f7deb-69f7e07 1331->1333 1336 69f7e15-69f7e18 1332->1336 1337 69f7e10 1332->1337 1333->1332 1341 69f804f-69f8059 1334->1341 1342 69f7e3a-69f7e43 1334->1342 1335->1325 1336->1323 1336->1334 1337->1336 1345 69f805a-69f8064 1342->1345 1346 69f7e49-69f7e66 1342->1346 1349 69f8066-69f808f 1345->1349 1350 69f80b5 1345->1350 1354 69f803c-69f8049 1346->1354 1355 69f7e6c-69f7e94 1346->1355 1352 69f8091-69f8094 1349->1352 1353 69f80b7-69f80ba 1350->1353 1352->1353 1356 69f8096-69f80b2 1352->1356 1357 69f8167-69f816a 1353->1357 1358 69f80c0-69f80cc 1353->1358 1354->1341 1354->1342 1355->1354 1379 69f7e9a-69f7ea3 1355->1379 1356->1350 1359 69f839f-69f83a1 1357->1359 1360 69f8170-69f817f 1357->1360 1365 69f80d7-69f80d9 1358->1365 1361 69f83a8-69f83ab 1359->1361 1362 69f83a3 1359->1362 1375 69f819e-69f81e2 1360->1375 1376 69f8181-69f819c 1360->1376 1361->1352 1366 69f83b1-69f83ba 1361->1366 1362->1361 1368 69f80db-69f80e1 1365->1368 1369 69f80f1-69f80f5 1365->1369 1370 69f80e5-69f80e7 1368->1370 1371 69f80e3 1368->1371 1372 69f80f7-69f8101 1369->1372 1373 69f8103 1369->1373 1370->1369 1371->1369 1378 69f8108-69f810a 1372->1378 1373->1378 1385 69f81e8-69f81f9 1375->1385 1386 69f8373-69f8389 1375->1386 1376->1375 1380 69f810c-69f810f 1378->1380 1381 69f8121-69f815a 1378->1381 1379->1345 1382 69f7ea9-69f7ec5 1379->1382 1380->1366 1381->1360 1406 69f815c-69f8166 1381->1406 1392 69f7ecb-69f7ef5 1382->1392 1393 69f802a-69f8036 1382->1393 1394 69f81ff-69f821c 1385->1394 1395 69f835e-69f836d 1385->1395 1386->1359 1408 69f7efb-69f7f23 1392->1408 1409 69f8020-69f8025 1392->1409 1393->1354 1393->1379 1394->1395 1407 69f8222-69f8318 call 69f6598 1394->1407 1395->1385 1395->1386 1458 69f831a-69f8324 1407->1458 1459 69f8326 1407->1459 1408->1409 1415 69f7f29-69f7f57 1408->1415 1409->1393 1415->1409 1421 69f7f5d-69f7f66 1415->1421 1421->1409 1423 69f7f6c-69f7f9e 1421->1423 1430 69f7fa9-69f7fc5 1423->1430 1431 69f7fa0-69f7fa4 1423->1431 1430->1393 1433 69f7fc7-69f801e call 69f6598 1430->1433 1431->1409 1432 69f7fa6 1431->1432 1432->1430 1433->1393 1460 69f832b-69f832d 1458->1460 1459->1460 1460->1395 1461 69f832f-69f8334 1460->1461 1462 69f8336-69f8340 1461->1462 1463 69f8342 1461->1463 1464 69f8347-69f8349 1462->1464 1463->1464 1464->1395 1465 69f834b-69f8357 1464->1465 1465->1395
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q
                                  • API String ID: 0-127220927
                                  • Opcode ID: 673fda93dcbcc4c538e86b9a797fc221b8517ebe3117935f7e10099cf77c758e
                                  • Instruction ID: d764ebc1e4694da959501c82c0fde0916612cdfbc96e2f980fe595d79129971d
                                  • Opcode Fuzzy Hash: 673fda93dcbcc4c538e86b9a797fc221b8517ebe3117935f7e10099cf77c758e
                                  • Instruction Fuzzy Hash: 1D02DC31B102058FCB94DF68DA90AAEB7B6FF84304F658929E505DB794DB75EC42CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1793 69f5598-69f55b5 1794 69f55b7-69f55ba 1793->1794 1795 69f55bc-69f55c6 1794->1795 1796 69f55d4-69f55d7 1794->1796 1799 69f55cd-69f55cf 1795->1799 1797 69f560f-69f5612 1796->1797 1798 69f55d9-69f55df 1796->1798 1802 69f561c-69f561f 1797->1802 1803 69f5614-69f5617 1797->1803 1800 69f576c-69f579b 1798->1800 1801 69f55e5-69f55ed 1798->1801 1799->1796 1814 69f57a5-69f57a8 1800->1814 1801->1800 1804 69f55f3-69f5600 1801->1804 1805 69f563c-69f563f 1802->1805 1806 69f5621-69f5637 1802->1806 1803->1802 1804->1800 1810 69f5606-69f560a 1804->1810 1808 69f5655-69f5658 1805->1808 1809 69f5641-69f5650 1805->1809 1806->1805 1812 69f565a-69f5660 1808->1812 1813 69f5667-69f566a 1808->1813 1809->1808 1810->1797 1816 69f56c2-69f56c5 1812->1816 1817 69f5662 1812->1817 1818 69f568e-69f5691 1813->1818 1819 69f566c-69f5689 1813->1819 1822 69f57ca-69f57cd 1814->1822 1823 69f57aa-69f57ae 1814->1823 1824 69f56ca-69f56cd 1816->1824 1817->1813 1820 69f5698-69f569b 1818->1820 1821 69f5693-69f5695 1818->1821 1819->1818 1825 69f56cf-69f56d5 1820->1825 1826 69f569d-69f56a0 1820->1826 1821->1820 1829 69f57ef-69f57f2 1822->1829 1830 69f57cf-69f57d3 1822->1830 1827 69f5896-69f58d4 1823->1827 1828 69f57b4-69f57bc 1823->1828 1824->1825 1831 69f56e0-69f56e3 1824->1831 1825->1795 1836 69f56db 1825->1836 1833 69f56ac-69f56af 1826->1833 1834 69f56a2-69f56ab 1826->1834 1858 69f58d6-69f58d9 1827->1858 1828->1827 1835 69f57c2-69f57c5 1828->1835 1840 69f580a-69f580d 1829->1840 1841 69f57f4-69f5805 1829->1841 1830->1827 1837 69f57d9-69f57e1 1830->1837 1838 69f56e5-69f56e9 1831->1838 1839 69f56f0-69f56f3 1831->1839 1844 69f56bd-69f56c0 1833->1844 1845 69f56b1-69f56b8 1833->1845 1835->1822 1836->1831 1837->1827 1847 69f57e7-69f57ea 1837->1847 1848 69f575e-69f576b 1838->1848 1849 69f56eb 1838->1849 1851 69f56fb-69f56fe 1839->1851 1852 69f56f5-69f56f6 1839->1852 1842 69f580f-69f5813 1840->1842 1843 69f582b-69f582e 1840->1843 1841->1840 1842->1827 1855 69f5819-69f5821 1842->1855 1856 69f583f-69f5842 1843->1856 1857 69f5830-69f583a 1843->1857 1844->1816 1844->1824 1845->1844 1847->1829 1849->1839 1853 69f571a-69f571d 1851->1853 1854 69f5700-69f5715 1851->1854 1852->1851 1861 69f571f-69f5725 1853->1861 1862 69f5730-69f5733 1853->1862 1854->1853 1855->1827 1860 69f5823-69f5826 1855->1860 1863 69f585c-69f585f 1856->1863 1864 69f5844-69f5848 1856->1864 1857->1856 1865 69f58df-69f58e2 1858->1865 1866 69f59c3-69f5b57 1858->1866 1860->1843 1861->1798 1868 69f572b 1861->1868 1870 69f5747-69f574a 1862->1870 1871 69f5735-69f5742 1862->1871 1874 69f5869-69f586c 1863->1874 1875 69f5861-69f5868 1863->1875 1864->1827 1872 69f584a-69f5852 1864->1872 1865->1866 1873 69f58e8-69f58eb 1865->1873 1942 69f5c8d-69f5ca0 1866->1942 1943 69f5b5d-69f5b64 1866->1943 1868->1862 1870->1861 1879 69f574c-69f574e 1870->1879 1871->1870 1872->1827 1876 69f5854-69f5857 1872->1876 1877 69f58ed-69f5900 1873->1877 1878 69f5903-69f5906 1873->1878 1881 69f586e-69f5875 1874->1881 1882 69f587c-69f587e 1874->1882 1876->1863 1890 69f5908-69f5919 1878->1890 1891 69f5920-69f5923 1878->1891 1888 69f5755-69f5758 1879->1888 1889 69f5750 1879->1889 1883 69f588e-69f5895 1881->1883 1884 69f5877 1881->1884 1885 69f5885-69f5888 1882->1885 1886 69f5880 1882->1886 1884->1882 1885->1814 1885->1883 1886->1885 1888->1794 1888->1848 1889->1888 1893 69f5925-69f592c 1890->1893 1899 69f591b 1890->1899 1891->1893 1894 69f5931-69f5934 1891->1894 1893->1894 1897 69f594e-69f5951 1894->1897 1898 69f5936-69f5947 1894->1898 1901 69f596b-69f596e 1897->1901 1902 69f5953-69f5964 1897->1902 1898->1893 1909 69f5949 1898->1909 1899->1891 1903 69f597c-69f597f 1901->1903 1904 69f5970-69f5977 1901->1904 1902->1877 1913 69f5966 1902->1913 1906 69f5999-69f599c 1903->1906 1907 69f5981-69f5992 1903->1907 1904->1903 1911 69f599e-69f59af 1906->1911 1912 69f59ba-69f59bd 1906->1912 1907->1898 1917 69f5994 1907->1917 1909->1897 1911->1893 1922 69f59b5 1911->1922 1912->1866 1916 69f5ca3-69f5ca6 1912->1916 1913->1901 1919 69f5ca8-69f5cad 1916->1919 1920 69f5cb0-69f5cb2 1916->1920 1917->1906 1919->1920 1923 69f5cb9-69f5cbc 1920->1923 1924 69f5cb4 1920->1924 1922->1912 1923->1858 1925 69f5cc2-69f5ccb 1923->1925 1924->1923 1944 69f5b6a-69f5b9d 1943->1944 1945 69f5c18-69f5c1f 1943->1945 1955 69f5b9f 1944->1955 1956 69f5ba2-69f5be3 1944->1956 1945->1942 1946 69f5c21-69f5c54 1945->1946 1958 69f5c59-69f5c86 1946->1958 1959 69f5c56 1946->1959 1955->1956 1967 69f5bfb-69f5c02 1956->1967 1968 69f5be5-69f5bf6 1956->1968 1958->1925 1959->1958 1969 69f5c0a-69f5c0c 1967->1969 1968->1925 1969->1925
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $
                                  • API String ID: 0-3993045852
                                  • Opcode ID: f140ffc51c65658dc1ba17613349797f960057c7d9d6fd58d0b017766695b762
                                  • Instruction ID: a12277acc8b2d5e1c26ac7deee79e14a308ea2f12a137bbedb5f8e8e5bdb49b2
                                  • Opcode Fuzzy Hash: f140ffc51c65658dc1ba17613349797f960057c7d9d6fd58d0b017766695b762
                                  • Instruction Fuzzy Hash: 3D22E231E102058FDF64DFA4C4806AEBBB6EF95320F228469E65AEB744DB35DC41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d20a57f7cbd29decd7ea563be82a066f1174b7f76ffb86582acac23e892f2596
                                  • Instruction ID: a744501862c553c36d67f3e11731c880c04e4668998954367cc469da3615e3d2
                                  • Opcode Fuzzy Hash: d20a57f7cbd29decd7ea563be82a066f1174b7f76ffb86582acac23e892f2596
                                  • Instruction Fuzzy Hash: AE62DF30B103058FDB54DB68D580AADB7F6EF84304F268469E60AEB794DB35ED46CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4e92b4716c868972f5b3f60625ff676be0f6eca9e709d6c3f89c6bc71a055965
                                  • Instruction ID: 1fd812fcdb56e83b08de3e2fd07fc2e21189a3ad7e46e5b40cd3c3f791ed94ac
                                  • Opcode Fuzzy Hash: 4e92b4716c868972f5b3f60625ff676be0f6eca9e709d6c3f89c6bc71a055965
                                  • Instruction Fuzzy Hash: AD32D131B10209CFDB54DB68E980AAEB7B6FB88310F21C529E505E7795DB35EC42CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a0b5398d9f1eb9d92f90e3173f7529b8ba80c6cb88295671911d5decdea19761
                                  • Instruction ID: 995af98441f15283b32df00215c334020789665b964d890cbc1884482ef8f20f
                                  • Opcode Fuzzy Hash: a0b5398d9f1eb9d92f90e3173f7529b8ba80c6cb88295671911d5decdea19761
                                  • Instruction Fuzzy Hash: 86228F30E201098FDF64CF69D9807ADB7BAEB85310F358426E549DB799CA34DC82CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 529 69facd8-69facf6 530 69facf8-69facfb 529->530 531 69facfd-69fad06 530->531 532 69fad0b-69fad0e 530->532 531->532 533 69faef5-69faefe 532->533 534 69fad14-69fad17 532->534 535 69fad36-69fad3f 533->535 536 69faf04-69faf0e 533->536 537 69fad19-69fad2c 534->537 538 69fad31-69fad34 534->538 539 69faf0f-69faf21 535->539 540 69fad45-69fad49 535->540 537->538 538->535 541 69fad4e-69fad51 538->541 551 69faeba-69faeeb 539->551 552 69faf23-69faf46 539->552 540->541 542 69fad53-69fad57 541->542 543 69fad62-69fad65 541->543 542->536 545 69fad5d 542->545 546 69fad79-69fad7c 543->546 547 69fad67-69fad74 543->547 545->543 549 69fad9f-69fada2 546->549 550 69fad7e-69fad9a 546->550 547->546 554 69fadac-69fadae 549->554 555 69fada4-69fada9 549->555 550->549 588 69faef2 551->588 556 69faf48-69faf4b 552->556 558 69fadb5-69fadb8 554->558 559 69fadb0 554->559 555->554 560 69faf4d-69faf57 556->560 561 69faf58-69faf5b 556->561 558->530 565 69fadbe-69fade2 558->565 559->558 563 69faf5d-69faf61 561->563 564 69faf68-69faf6b 561->564 567 69fafa9-69fafe4 563->567 568 69faf63 563->568 569 69faf6d call 69fb230 564->569 570 69faf7a-69faf7d 564->570 587 69fade8-69fadf7 565->587 565->588 579 69fafea-69faff6 567->579 580 69fb1d7-69fb1ea 567->580 568->564 577 69faf73-69faf75 569->577 573 69faf7f-69faf9b 570->573 574 69fafa0-69fafa3 570->574 573->574 574->567 578 69fb20c-69fb20e 574->578 577->570 582 69fb215-69fb218 578->582 583 69fb210 578->583 592 69faff8-69fb011 579->592 593 69fb016-69fb05a 579->593 585 69fb1ec 580->585 582->556 589 69fb21e-69fb228 582->589 583->582 585->578 596 69fae0f-69fae4a call 69f6598 587->596 597 69fadf9-69fadff 587->597 588->533 592->585 610 69fb05c-69fb06e 593->610 611 69fb076-69fb0b5 593->611 613 69fae4c-69fae52 596->613 614 69fae62-69fae79 596->614 599 69fae03-69fae05 597->599 600 69fae01 597->600 599->596 600->596 610->611 620 69fb19c-69fb1b1 611->620 621 69fb0bb-69fb196 call 69f6598 611->621 617 69fae56-69fae58 613->617 618 69fae54 613->618 626 69fae7b-69fae81 614->626 627 69fae91-69faea2 614->627 617->614 618->614 620->580 621->620 629 69fae85-69fae87 626->629 630 69fae83 626->630 627->551 634 69faea4-69faeaa 627->634 629->627 630->627 635 69faeae-69faeb0 634->635 636 69faeac 634->636 635->551 636->551
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-1273862796
                                  • Opcode ID: 3411968568850194b1efd3b268de6404f9edd98197c0a89406914373c52a6f1e
                                  • Instruction ID: bd9d305b6dfd037e64850d446426e8e3282324422ca28507a6b76d965ddbc045
                                  • Opcode Fuzzy Hash: 3411968568850194b1efd3b268de6404f9edd98197c0a89406914373c52a6f1e
                                  • Instruction Fuzzy Hash: 90E17231F202098FDF68DF68D9806AEB7B6EF85304F21852AD509AB754DB34DC46CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 782 69fb658-69fb67a 783 69fb67c-69fb67f 782->783 784 69fb686-69fb689 783->784 785 69fb681-69fb683 783->785 786 69fb68b-69fb694 784->786 787 69fb699-69fb69c 784->787 785->784 786->787 788 69fb69e-69fb6a4 787->788 789 69fb6a9-69fb6ac 787->789 788->789 790 69fb6ae-69fb6b7 789->790 791 69fb6c2-69fb6c5 789->791 792 69fb6bd 790->792 793 69fb88b-69fb894 790->793 794 69fb6dc-69fb6df 791->794 795 69fb6c7-69fb6ca 791->795 792->791 796 69fb9fb-69fba36 793->796 800 69fb89a-69fb8a1 793->800 798 69fb71e-69fb721 794->798 799 69fb6e1-69fb6f6 794->799 795->796 797 69fb6d0-69fb6d7 795->797 813 69fba38-69fba3b 796->813 797->794 801 69fb72b-69fb72e 798->801 802 69fb723-69fb726 798->802 799->796 816 69fb6fc-69fb719 799->816 803 69fb8a6-69fb8a9 800->803 806 69fb751-69fb754 801->806 807 69fb730-69fb734 801->807 802->801 808 69fb8ab-69fb8ae 803->808 809 69fb878-69fb87b 803->809 814 69fb768-69fb76b 806->814 815 69fb756-69fb75d 806->815 807->796 810 69fb73a-69fb74a 807->810 811 69fb8c1-69fb8c4 808->811 812 69fb8b0-69fb8bc 808->812 809->795 817 69fb881 809->817 837 69fb74c 810->837 838 69fb7a3-69fb7a7 810->838 818 69fb8d6-69fb8d9 811->818 819 69fb8c6 811->819 812->811 820 69fbca7-69fbcaa 813->820 821 69fba41-69fba69 813->821 824 69fb76d-69fb776 814->824 825 69fb77b-69fb77e 814->825 822 69fb865-69fb86e 815->822 823 69fb763 815->823 816->798 826 69fb886-69fb889 817->826 831 69fb8db-69fb8df 818->831 832 69fb900-69fb903 818->832 839 69fb8ce-69fb8d1 819->839 829 69fbccd-69fbccf 820->829 830 69fbcac-69fbcc8 820->830 879 69fba6b-69fba6e 821->879 880 69fba73-69fbab7 821->880 833 69fb873-69fb876 822->833 823->814 824->825 834 69fb788-69fb78b 825->834 835 69fb780-69fb785 825->835 826->793 826->803 842 69fbcd6-69fbcd9 829->842 843 69fbcd1 829->843 830->829 831->796 841 69fb8e5-69fb8f5 831->841 845 69fb91a-69fb91d 832->845 846 69fb905-69fb909 832->846 833->809 833->826 834->790 844 69fb791-69fb794 834->844 835->834 837->806 838->796 847 69fb7ad-69fb7bd 838->847 839->818 841->807 868 69fb8fb 841->868 842->813 851 69fbcdf-69fbce8 842->851 843->842 852 69fb79e-69fb7a1 844->852 853 69fb796-69fb799 844->853 848 69fb923-69fb926 845->848 849 69fb840-69fb841 845->849 846->796 854 69fb90f-69fb915 846->854 847->849 869 69fb7c3 847->869 848->849 855 69fb92c-69fb92f 848->855 856 69fb846-69fb849 849->856 852->838 859 69fb7c8-69fb7cb 852->859 853->852 854->845 861 69fb951-69fb954 855->861 862 69fb931-69fb94c 855->862 863 69fb84b-69fb84f 856->863 864 69fb860-69fb863 856->864 865 69fb7cd-69fb7d1 859->865 866 69fb7e2-69fb7e5 859->866 874 69fb977-69fb97a 861->874 875 69fb956-69fb972 861->875 862->861 863->796 870 69fb855-69fb85b 863->870 864->822 864->833 865->796 871 69fb7d7-69fb7dd 865->871 872 69fb7e7-69fb7f0 866->872 873 69fb7f5-69fb7f8 866->873 868->832 869->859 870->864 871->866 872->873 873->849 878 69fb7fa-69fb7fd 873->878 881 69fb9de-69fb9e0 874->881 882 69fb97c-69fb9d9 call 69f6598 874->882 875->874 883 69fb7ff-69fb814 878->883 884 69fb83b-69fb83e 878->884 879->851 901 69fbabd-69fbac6 880->901 902 69fbc9c-69fbca6 880->902 886 69fb9e7-69fb9ea 881->886 887 69fb9e2 881->887 882->881 883->796 897 69fb81a-69fb836 883->897 884->849 884->856 886->783 890 69fb9f0-69fb9fa 886->890 887->886 897->884 903 69fbacc-69fbb38 call 69f6598 901->903 904 69fbc92-69fbc97 901->904 916 69fbb3e-69fbb43 903->916 917 69fbc32-69fbc47 903->917 904->902 918 69fbb5f 916->918 919 69fbb45-69fbb4b 916->919 917->904 923 69fbb61-69fbb67 918->923 921 69fbb4d-69fbb4f 919->921 922 69fbb51-69fbb53 919->922 924 69fbb5d 921->924 922->924 925 69fbb7c-69fbb89 923->925 926 69fbb69-69fbb6f 923->926 924->923 933 69fbb8b-69fbb91 925->933 934 69fbba1-69fbbae 925->934 927 69fbc1d-69fbc2c 926->927 928 69fbb75 926->928 927->916 927->917 928->925 929 69fbbe4-69fbbf1 928->929 930 69fbbb0-69fbbbd 928->930 939 69fbc09-69fbc16 929->939 940 69fbbf3-69fbbf9 929->940 942 69fbbbf-69fbbc5 930->942 943 69fbbd5-69fbbe2 930->943 937 69fbb95-69fbb97 933->937 938 69fbb93 933->938 934->927 937->934 938->934 939->927 944 69fbbfd-69fbbff 940->944 945 69fbbfb 940->945 946 69fbbc9-69fbbcb 942->946 947 69fbbc7 942->947 943->927 944->939 945->939 946->943 947->943
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-3723351465
                                  • Opcode ID: 94f6e3c615a352e7305cd6e98d33cc0d5605098e18d52eccfd23c45b4fec0810
                                  • Instruction ID: 26c5b13f2499ac3952a835e3c70f2d69437157e2380656c879f4a3abbf9f3a40
                                  • Opcode Fuzzy Hash: 94f6e3c615a352e7305cd6e98d33cc0d5605098e18d52eccfd23c45b4fec0810
                                  • Instruction Fuzzy Hash: E8027D30E202098FDF64CF68D5806ADB7B9EF85314F228926D505EBB59DB34DC86CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 950 69f9150-69f9175 951 69f9177-69f917a 950->951 952 69f9a38-69f9a3b 951->952 953 69f9180-69f9195 951->953 954 69f9a3d-69f9a5c 952->954 955 69f9a61-69f9a63 952->955 961 69f91ad-69f91c3 953->961 962 69f9197-69f919d 953->962 954->955 957 69f9a6a-69f9a6d 955->957 958 69f9a65 955->958 957->951 959 69f9a73-69f9a7d 957->959 958->957 967 69f91ce-69f91d0 961->967 963 69f919f 962->963 964 69f91a1-69f91a3 962->964 963->961 964->961 968 69f91e8-69f9259 967->968 969 69f91d2-69f91d8 967->969 980 69f925b-69f927e 968->980 981 69f9285-69f92a1 968->981 970 69f91dc-69f91de 969->970 971 69f91da 969->971 970->968 971->968 980->981 986 69f92cd-69f92e8 981->986 987 69f92a3-69f92c6 981->987 992 69f92ea-69f930c 986->992 993 69f9313-69f932e 986->993 987->986 992->993 998 69f9353-69f9361 993->998 999 69f9330-69f934c 993->999 1000 69f9363-69f936c 998->1000 1001 69f9371-69f93eb 998->1001 999->998 1000->959 1007 69f93ed-69f940b 1001->1007 1008 69f9438-69f944d 1001->1008 1012 69f940d-69f941c 1007->1012 1013 69f9427-69f9436 1007->1013 1008->952 1012->1013 1013->1007 1013->1008
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q
                                  • API String ID: 0-858218434
                                  • Opcode ID: f90247e3e5fa8e3f61bc3209f328d3aadeb895cf074c4373f69dafe008accdbc
                                  • Instruction ID: 518b2d523f24764d37bf1f520d76677079c53d9b2720023d28768678a5472ddd
                                  • Opcode Fuzzy Hash: f90247e3e5fa8e3f61bc3209f328d3aadeb895cf074c4373f69dafe008accdbc
                                  • Instruction Fuzzy Hash: 05917C31B1021A8FDB54DF69D850BAEB7F6AF85204F108469D909EB384EF70DD468B92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1016 69fcf58-69fcf73 1017 69fcf75-69fcf78 1016->1017 1018 69fcf7a-69fcfbc 1017->1018 1019 69fcfc1-69fcfc4 1017->1019 1018->1019 1020 69fd00d-69fd010 1019->1020 1021 69fcfc6-69fd008 1019->1021 1023 69fd033-69fd036 1020->1023 1024 69fd012-69fd02e 1020->1024 1021->1020 1026 69fd038-69fd04e 1023->1026 1027 69fd053-69fd056 1023->1027 1024->1023 1026->1027 1028 69fd05c-69fd05f 1027->1028 1029 69fd440-69fd44c 1027->1029 1036 69fd06e-69fd071 1028->1036 1037 69fd061-69fd063 1028->1037 1032 69fd452-69fd73f 1029->1032 1033 69fd1b0-69fd1bf 1029->1033 1228 69fd966-69fd970 1032->1228 1229 69fd745-69fd74b 1032->1229 1042 69fd1ce-69fd1da 1033->1042 1043 69fd1c1-69fd1c6 1033->1043 1044 69fd07b-69fd07e 1036->1044 1045 69fd073-69fd078 1036->1045 1039 69fd43d 1037->1039 1040 69fd069 1037->1040 1039->1029 1040->1036 1049 69fd971-69fd9a6 1042->1049 1050 69fd1e0-69fd1f2 1042->1050 1043->1042 1051 69fd0c7-69fd0ca 1044->1051 1052 69fd080-69fd0c2 1044->1052 1045->1044 1063 69fd9a8-69fd9ab 1049->1063 1064 69fd1f7-69fd1fa 1050->1064 1053 69fd0cc-69fd10e 1051->1053 1054 69fd113-69fd116 1051->1054 1052->1051 1053->1054 1059 69fd15f-69fd162 1054->1059 1060 69fd118-69fd127 1054->1060 1068 69fd1ab-69fd1ae 1059->1068 1069 69fd164-69fd1a6 1059->1069 1065 69fd129-69fd12e 1060->1065 1066 69fd136-69fd142 1060->1066 1071 69fd9ce-69fd9d1 1063->1071 1072 69fd9ad-69fd9c9 1063->1072 1073 69fd1fc-69fd23e 1064->1073 1074 69fd243-69fd246 1064->1074 1065->1066 1066->1049 1077 69fd148-69fd15a 1066->1077 1068->1033 1068->1064 1069->1068 1080 69fd9d3 call 69fdac5 1071->1080 1081 69fd9e0-69fd9e3 1071->1081 1072->1071 1073->1074 1082 69fd28f-69fd292 1074->1082 1083 69fd248-69fd28a 1074->1083 1077->1059 1101 69fd9d9-69fd9db 1080->1101 1091 69fda16-69fda18 1081->1091 1092 69fd9e5-69fda11 1081->1092 1089 69fd29d-69fd2a0 1082->1089 1090 69fd294-69fd296 1082->1090 1083->1082 1098 69fd2e9-69fd2eb 1089->1098 1099 69fd2a2-69fd2e4 1089->1099 1096 69fd2fb-69fd304 1090->1096 1097 69fd298 1090->1097 1102 69fda1f-69fda22 1091->1102 1103 69fda1a 1091->1103 1092->1091 1110 69fd306-69fd30b 1096->1110 1111 69fd313-69fd31f 1096->1111 1097->1089 1107 69fd2ed 1098->1107 1108 69fd2f2-69fd2f5 1098->1108 1099->1098 1101->1081 1102->1063 1112 69fda24-69fda33 1102->1112 1103->1102 1107->1108 1108->1017 1108->1096 1110->1111 1117 69fd325-69fd339 1111->1117 1118 69fd430-69fd435 1111->1118 1124 69fda9a-69fdaaf 1112->1124 1125 69fda35-69fda98 call 69f6598 1112->1125 1117->1039 1131 69fd33f-69fd351 1117->1131 1118->1039 1125->1124 1143 69fd375-69fd377 1131->1143 1144 69fd353-69fd359 1131->1144 1153 69fd381-69fd38d 1143->1153 1149 69fd35d-69fd369 1144->1149 1150 69fd35b 1144->1150 1151 69fd36b-69fd373 1149->1151 1150->1151 1151->1153 1161 69fd38f-69fd399 1153->1161 1162 69fd39b 1153->1162 1164 69fd3a0-69fd3a2 1161->1164 1162->1164 1164->1039 1166 69fd3a8-69fd3c4 call 69f6598 1164->1166 1175 69fd3c6-69fd3cb 1166->1175 1176 69fd3d3-69fd3df 1166->1176 1175->1176 1176->1118 1178 69fd3e1-69fd42e 1176->1178 1178->1039 1230 69fd74d-69fd752 1229->1230 1231 69fd75a-69fd763 1229->1231 1230->1231 1231->1049 1232 69fd769-69fd77c 1231->1232 1234 69fd956-69fd960 1232->1234 1235 69fd782-69fd788 1232->1235 1234->1228 1234->1229 1236 69fd78a-69fd78f 1235->1236 1237 69fd797-69fd7a0 1235->1237 1236->1237 1237->1049 1238 69fd7a6-69fd7c7 1237->1238 1241 69fd7c9-69fd7ce 1238->1241 1242 69fd7d6-69fd7df 1238->1242 1241->1242 1242->1049 1243 69fd7e5-69fd802 1242->1243 1243->1234 1246 69fd808-69fd80e 1243->1246 1246->1049 1247 69fd814-69fd82d 1246->1247 1249 69fd949-69fd950 1247->1249 1250 69fd833-69fd85a 1247->1250 1249->1234 1249->1246 1250->1049 1253 69fd860-69fd86a 1250->1253 1253->1049 1254 69fd870-69fd887 1253->1254 1256 69fd889-69fd894 1254->1256 1257 69fd896-69fd8b1 1254->1257 1256->1257 1257->1249 1262 69fd8b7-69fd8d0 call 69f6598 1257->1262 1266 69fd8df-69fd8e8 1262->1266 1267 69fd8d2-69fd8d7 1262->1267 1266->1049 1268 69fd8ee-69fd942 1266->1268 1267->1266 1268->1249
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q
                                  • API String ID: 0-182748909
                                  • Opcode ID: b764acb1eae3e1a575de871e9b9b80468614d8cb2e49324fe2bbd67b17435038
                                  • Instruction ID: 99d8d388343d693373906cc9026f4e320ae0acc7b9b5176cde164500b951c5e4
                                  • Opcode Fuzzy Hash: b764acb1eae3e1a575de871e9b9b80468614d8cb2e49324fe2bbd67b17435038
                                  • Instruction Fuzzy Hash: C6628031A1020A8FCB55EF68D590A5DB7F6FF84344B21C928D0099F769EB75ED4ACB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1276 69f4b58-69f4b7c 1277 69f4b7e-69f4b81 1276->1277 1278 69f4b87-69f4c7f 1277->1278 1279 69f5260-69f5263 1277->1279 1299 69f4c85-69f4cd2 call 69f5408 1278->1299 1300 69f4d02-69f4d09 1278->1300 1280 69f5265-69f527f 1279->1280 1281 69f5284-69f5286 1279->1281 1280->1281 1282 69f528d-69f5290 1281->1282 1283 69f5288 1281->1283 1282->1277 1285 69f5296-69f52a3 1282->1285 1283->1282 1313 69f4cd8-69f4cf4 1299->1313 1301 69f4d0f-69f4d7f 1300->1301 1302 69f4d8d-69f4d96 1300->1302 1319 69f4d8a 1301->1319 1320 69f4d81 1301->1320 1302->1285 1316 69f4cff 1313->1316 1317 69f4cf6 1313->1317 1316->1300 1317->1316 1319->1302 1320->1319
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fbq$XPbq$\Obq
                                  • API String ID: 0-4057264190
                                  • Opcode ID: 2618884124dac85c3d3639a7250014af5b66eab5ad8abe91512b8b34b214f4af
                                  • Instruction ID: 8f7481a96ae2e017f128edce5f981f9fe46a8d68cfee25ca81a28844c95e24be
                                  • Opcode Fuzzy Hash: 2618884124dac85c3d3639a7250014af5b66eab5ad8abe91512b8b34b214f4af
                                  • Instruction Fuzzy Hash: F661B030F002089FEB549FA5C8547AEBBF6FF88700F21842AE506AB395DB758C058B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1700 69f9141-69f9175 1701 69f9177-69f917a 1700->1701 1702 69f9a38-69f9a3b 1701->1702 1703 69f9180-69f9195 1701->1703 1704 69f9a3d-69f9a5c 1702->1704 1705 69f9a61-69f9a63 1702->1705 1711 69f91ad-69f91c3 1703->1711 1712 69f9197-69f919d 1703->1712 1704->1705 1707 69f9a6a-69f9a6d 1705->1707 1708 69f9a65 1705->1708 1707->1701 1709 69f9a73-69f9a7d 1707->1709 1708->1707 1717 69f91ce-69f91d0 1711->1717 1713 69f919f 1712->1713 1714 69f91a1-69f91a3 1712->1714 1713->1711 1714->1711 1718 69f91e8-69f9259 1717->1718 1719 69f91d2-69f91d8 1717->1719 1730 69f925b-69f927e 1718->1730 1731 69f9285-69f92a1 1718->1731 1720 69f91dc-69f91de 1719->1720 1721 69f91da 1719->1721 1720->1718 1721->1718 1730->1731 1736 69f92cd-69f92e8 1731->1736 1737 69f92a3-69f92c6 1731->1737 1742 69f92ea-69f930c 1736->1742 1743 69f9313-69f932e 1736->1743 1737->1736 1742->1743 1748 69f9353-69f9361 1743->1748 1749 69f9330-69f934c 1743->1749 1750 69f9363-69f936c 1748->1750 1751 69f9371-69f93eb 1748->1751 1749->1748 1750->1709 1757 69f93ed-69f940b 1751->1757 1758 69f9438-69f944d 1751->1758 1762 69f940d-69f941c 1757->1762 1763 69f9427-69f9436 1757->1763 1758->1702 1762->1763 1763->1757 1763->1758
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q
                                  • API String ID: 0-127220927
                                  • Opcode ID: 495b9b8e637c96772b258b80f3796230e62e82c95301e23cfd9803b48cde2144
                                  • Instruction ID: a563735012c487a689aa856abc151cf19c18f50e000ad9865d80ddf6bbc3012e
                                  • Opcode Fuzzy Hash: 495b9b8e637c96772b258b80f3796230e62e82c95301e23cfd9803b48cde2144
                                  • Instruction Fuzzy Hash: 2A515D31B111069FDB54DB78D890BAEB7F6EBC8614F108469D909DB398EE31DC06CB92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: b7b52ae01b9dd37baf1007e6a26b0a5ce7b3a35986686e4b4381e16b657a1a06
                                  • Instruction ID: 80a57f0023e8b13bbf1c4870bf2bc0ad12b3388635724367700bf968f99a8f70
                                  • Opcode Fuzzy Hash: b7b52ae01b9dd37baf1007e6a26b0a5ce7b3a35986686e4b4381e16b657a1a06
                                  • Instruction Fuzzy Hash: 0E717470A00B058FD7A5DF6AD54575ABBF5FF88300F108A2AE48AC7B54DB35E805CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069ED922
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: e6acf7738ceb97ba5a03b529a8e164c62e2f70fd93263113d969439333b43a51
                                  • Instruction ID: b84e9ec17dacaf99882e930f143557324e6847202fde0941fec852985e802397
                                  • Opcode Fuzzy Hash: e6acf7738ceb97ba5a03b529a8e164c62e2f70fd93263113d969439333b43a51
                                  • Instruction Fuzzy Hash: FB51E0B1C00249AFDF16CF99C984ADDBFB5BF49300F24816AE818AB220D7319945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3261466779.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1390000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6b99dd42eed288b796a195de7b79be7a39f88e9c9573b7276aad82f5e56a026
                                  • Instruction ID: 2eb9b640a4d7f408480159d18e9401d84718280dee4d8336918eb7103f3f0965
                                  • Opcode Fuzzy Hash: a6b99dd42eed288b796a195de7b79be7a39f88e9c9573b7276aad82f5e56a026
                                  • Instruction Fuzzy Hash: CE412471D043999FCB14DF69D8042DEBFF5AF89310F04856AD908A7281EB389881CBE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 069ED922
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 83c41bd261c0974e33b2185e9bd7f425cc7c6a4bb8773be63cb801307a27f499
                                  • Instruction ID: 5f5faa0f715d3bfdc4158f9970381c774d6113faf01e5d84926786c80b0dede0
                                  • Opcode Fuzzy Hash: 83c41bd261c0974e33b2185e9bd7f425cc7c6a4bb8773be63cb801307a27f499
                                  • Instruction Fuzzy Hash: FC41CFB1D00309EFDB15CF9AC884ADEBBB5BF48310F24852AE819AB210D775A945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 069EFE91
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: f64de76cab5f708b600177c297e8e9adf884afd65b65fa80142a4fbf0baf1c88
                                  • Instruction ID: daaeb8ca88879808b4d56eddf4b4ebb50e9fad9a47c91a993b5bf0ad73837741
                                  • Opcode Fuzzy Hash: f64de76cab5f708b600177c297e8e9adf884afd65b65fa80142a4fbf0baf1c88
                                  • Instruction Fuzzy Hash: 754127B4900709CFDB55CF99C448AAABBF5FF88314F24C859E519AB721D335A840CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069E30D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: c2e266110afff50c1804398d9ca8cd61301cc7d77d15fee27dbeadd6297191c6
                                  • Instruction ID: 4a947f345b6353d687768be597b84f13fc85c346362667664c805bf6cde16487
                                  • Opcode Fuzzy Hash: c2e266110afff50c1804398d9ca8cd61301cc7d77d15fee27dbeadd6297191c6
                                  • Instruction Fuzzy Hash: 5821E7B5D002089FDB10CF9AD584ADEFBF9FB48310F14841AE915A7210D375A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 069E30D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 3d00ae61b4dca5c280555ea24416aab87f916413d713a9768d391af30e1a156e
                                  • Instruction ID: 6c485b6efc53a32bab60af3d7c37d61273039453338943720fc486e9cf1b5485
                                  • Opcode Fuzzy Hash: 3d00ae61b4dca5c280555ea24416aab87f916413d713a9768d391af30e1a156e
                                  • Instruction Fuzzy Hash: CB21C4B5D002489FDB10CF9AD984AEEFBF9FB48310F14841AE919A3350D379A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 069EB6EA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 3e918ac95a8af9c0905a7628559919e267e427db6d5e1033d4832c897eb30ffe
                                  • Instruction ID: 281953b7fe405e402b2bed460924fe92d3ec5cef20326b275a143fca6a3cf677
                                  • Opcode Fuzzy Hash: 3e918ac95a8af9c0905a7628559919e267e427db6d5e1033d4832c897eb30ffe
                                  • Instruction Fuzzy Hash: 591126B6C003499FDB10CF9AD944AEEFBF8EB88720F10841AD519A7610C379A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0139EC8F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3261466779.0000000001390000.00000040.00000800.00020000.00000000.sdmp, Offset: 01390000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_1390000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID:
                                  • API String ID: 1890195054-0
                                  • Opcode ID: 53ddb361329bcdaec97638cc5ff29da174f6fad77e803b413bd75bb50e521a36
                                  • Instruction ID: 32d06c3eec32aea5e83f3a84e479cd18085b906537618abfbc3a646f7e8eaa71
                                  • Opcode Fuzzy Hash: 53ddb361329bcdaec97638cc5ff29da174f6fad77e803b413bd75bb50e521a36
                                  • Instruction Fuzzy Hash: D5111FB1C006599BDB10DF9AC544AAEFBF4EF48320F11812AD818A7240D378A944CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 069EB6EA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: b9746c524c454400ff2c3fc588441ea04b3ddd594c98c38ce108ddf2eca20769
                                  • Instruction ID: 52c43fd64c8697debd62ffad578a4cb994feed38e6bdc92f3719116b7cc7cabb
                                  • Opcode Fuzzy Hash: b9746c524c454400ff2c3fc588441ea04b3ddd594c98c38ce108ddf2eca20769
                                  • Instruction Fuzzy Hash: 7D11F3B6C003098FDB10CF9AD944AEEFBF9EB48720F10842AD519A7610C379A545CFA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,069EB244), ref: 069EB47E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266096719.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69e0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 58bddcaedfe10dfd5c42d7d38b72cf2e1966597646a7af6a33fbc4a835984407
                                  • Instruction ID: 025f71b20caa75b695d027ea70025d62c770892c6147a954d7e0e2d93a7bad18
                                  • Opcode Fuzzy Hash: 58bddcaedfe10dfd5c42d7d38b72cf2e1966597646a7af6a33fbc4a835984407
                                  • Instruction Fuzzy Hash: 7E1132B2C003498FCB10DF9AC544AAEFBF8EB48314F10842AD419A7614D379A544CFA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: XPbq
                                  • API String ID: 0-864591470
                                  • Opcode ID: 19d82477b6651eef4e41ee7c4f067ff2d52d9ad256ac40ca978c30e22ba9997a
                                  • Instruction ID: 87744e721e84c2ed55de2002112da4d7b864d872b238816e70f94b77f24738ba
                                  • Opcode Fuzzy Hash: 19d82477b6651eef4e41ee7c4f067ff2d52d9ad256ac40ca978c30e22ba9997a
                                  • Instruction Fuzzy Hash: B641A030F102089FDB559FA5C854B9EBBF6FF88700F21842AE506AB795DB758C06DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: PH]q
                                  • API String ID: 0-3168235125
                                  • Opcode ID: bfdd204db55ab220833c6f7116ccd48e683ef3b098b040bd0e8b6469867a2804
                                  • Instruction ID: f785d380b3243c45d802f2d91a7073ccc17771240dc2a2290c84eb71468124e5
                                  • Opcode Fuzzy Hash: bfdd204db55ab220833c6f7116ccd48e683ef3b098b040bd0e8b6469867a2804
                                  • Instruction Fuzzy Hash: A6410230E1030ADFDB64DF64D45069EBBBAFF85300F21492AE505EB644EB75D94ACB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: PH]q
                                  • API String ID: 0-3168235125
                                  • Opcode ID: cd9211fb337ed3a950b7ee09695b3df0f8028fcd055d2e1e794d1298776e9286
                                  • Instruction ID: 6611c983c317672513bf7b4184ba3b6108e89e7fc48fe3669bea84e51aa211d0
                                  • Opcode Fuzzy Hash: cd9211fb337ed3a950b7ee09695b3df0f8028fcd055d2e1e794d1298776e9286
                                  • Instruction Fuzzy Hash: C531D230B202019FDB589BB4D85476E77E6BF89604F218438E546DB388DF3ADE06CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 788d604f58cc8827cef2fdebbae732a4f573d945e486bd73c750dc0e962a68ef
                                  • Instruction ID: 5b734824808668d84a353cc41fbba00fbe32ceafad5181cb8eed7cd7cc46372a
                                  • Opcode Fuzzy Hash: 788d604f58cc8827cef2fdebbae732a4f573d945e486bd73c750dc0e962a68ef
                                  • Instruction Fuzzy Hash: D2927734E102048FCB64DBA8C584B9DB7F6FB45314F6684A9E509EB7A5DB34ED81CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5f101b5e2534a62af539280c3b07d07f86ccf4437c3f590c9c952e599b6f05b8
                                  • Instruction ID: ba15fdabf79f6f7538e8be3f95e69c44407735d5dd4503e3f6220e961a8a5b6b
                                  • Opcode Fuzzy Hash: 5f101b5e2534a62af539280c3b07d07f86ccf4437c3f590c9c952e599b6f05b8
                                  • Instruction Fuzzy Hash: FA61DF71F101114FDB54AB6EC88099FBADBAFD4220B254439D90EDB364DEAADD0387D2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73a510a63de57a921bce4b5dd2bda9e960cbde4d985bee5c9e6c55480511922e
                                  • Instruction ID: 4e369f555a0a75c3f74c2d55ff21005045f7329ab58b7baf724e52f76a09b598
                                  • Opcode Fuzzy Hash: 73a510a63de57a921bce4b5dd2bda9e960cbde4d985bee5c9e6c55480511922e
                                  • Instruction Fuzzy Hash: CD817E31B102068FDF44DFA8C4546AEB7F7AF89704F218429D50AEB795EB34DC468B82
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a1431f57dec640ceda4d8b661b86e306e9cd0b96cd180a53b3e83aaf3e5334f8
                                  • Instruction ID: 2c66f34e3f75937dc3de774757bb2d00464fc01c93dbeee52197a9f8cd0c4ad1
                                  • Opcode Fuzzy Hash: a1431f57dec640ceda4d8b661b86e306e9cd0b96cd180a53b3e83aaf3e5334f8
                                  • Instruction Fuzzy Hash: A3915E30E102198FDF60DF68C890B9EB7B5FF85300F208599D549AB295DB74AA85CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4867932404bbe5d0e08d5f31fe21b4bd10cd94156c4de7312a2ba9a10126347a
                                  • Instruction ID: 46dcf8818b8a9bdbc9d6588f7921408c87f43d31e0d447d38dab36c5c59945cc
                                  • Opcode Fuzzy Hash: 4867932404bbe5d0e08d5f31fe21b4bd10cd94156c4de7312a2ba9a10126347a
                                  • Instruction Fuzzy Hash: EF914D30E102198BDF60DF68C890B9EB7B5FF89304F208599D50DAB355EB70AA85CF91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7cb1f1e5aa489c566b8590f1c41deeb7772bba263ae20603b63e3c5a48115ce
                                  • Instruction ID: 50905fce8a080b3872bd2b4322834fecbd3e53489045db853172b3efe4b19069
                                  • Opcode Fuzzy Hash: c7cb1f1e5aa489c566b8590f1c41deeb7772bba263ae20603b63e3c5a48115ce
                                  • Instruction Fuzzy Hash: 6F714E30A102099FDB54DFA9D990A9EBBF6FF84300F258429E105EB765DB34ED46CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2994f7ed2becb0314c99f84c77d78aeb564b72d47c8108e339061a7e137442b2
                                  • Instruction ID: 87bd39d9ab2f1c73a2ba42186f6010d6c2d898b7e184712fc66dbcd37ced4f3c
                                  • Opcode Fuzzy Hash: 2994f7ed2becb0314c99f84c77d78aeb564b72d47c8108e339061a7e137442b2
                                  • Instruction Fuzzy Hash: 86715C30A102099FDB54DFA9D990A9EBBF6FF84300F258429E109EB765DB34ED46CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b399ffec0aca97ef36b7bab37e576e72feef81a5b41dfd55498b7cd01dbb831d
                                  • Instruction ID: 4df71fd24f651a0df066b34bc000c82f9ed03cb070c76cf1687973b7656b67d7
                                  • Opcode Fuzzy Hash: b399ffec0aca97ef36b7bab37e576e72feef81a5b41dfd55498b7cd01dbb831d
                                  • Instruction Fuzzy Hash: D3510631E101059FCF64EB78E8946ADBBB6FF84315F21486AE20AE7750DB359845CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2d71c2db41d68ee61f49648d41fa232b191a2b5661ada63729d1c9a98ef3e089
                                  • Instruction ID: 4023383500c96b4a1f66bf511b481b6e2c58828620fdc1751b982a939dfbb9e4
                                  • Opcode Fuzzy Hash: 2d71c2db41d68ee61f49648d41fa232b191a2b5661ada63729d1c9a98ef3e089
                                  • Instruction Fuzzy Hash: 1651F971B202158FEF60676CE9A072E265EDB89710F314925E90ED3BD5DA3CCC4583A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 286c7955f02ad7f1686159d9eb4d0a06ef9be165f1bd00def4b876239d335261
                                  • Instruction ID: 88f67f6b83d03eca6ff768eb8ac973c06424654921b5b6c52effca6a7782b494
                                  • Opcode Fuzzy Hash: 286c7955f02ad7f1686159d9eb4d0a06ef9be165f1bd00def4b876239d335261
                                  • Instruction Fuzzy Hash: 3751D871B202158FEF64676CD8A472F265EDB89710F304929EA0EC37D9DA78CC458392
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 15c7b5ac05561af462ef4ca96f77c00108e512430643caafe26c3ff8c89402dc
                                  • Instruction ID: 4f48c4e993a9a2a1510bb81c7563702265acc828bc069c48db8cc854b2b6309a
                                  • Opcode Fuzzy Hash: 15c7b5ac05561af462ef4ca96f77c00108e512430643caafe26c3ff8c89402dc
                                  • Instruction Fuzzy Hash: 55419371E106098FCF70CFA9D8C0AAFFBB6EB94310F22492AD215D7A50D730E9558B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 583d7ca7d7667050a7a7982a8fb08c0ff90660e984e5ccedea0be0a17464e2b7
                                  • Instruction ID: 0828bc1a3d0bd9fee76ef76b66283894ae7d28f67f9cf199eece70e92af2be4f
                                  • Opcode Fuzzy Hash: 583d7ca7d7667050a7a7982a8fb08c0ff90660e984e5ccedea0be0a17464e2b7
                                  • Instruction Fuzzy Hash: D831C675F142058FDB608F69C4C066EFBB5EB55310F27887AE269DBA41C635E840CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b9c7873e9ac0f4ea87b8cb6eb7bce69d701e774d384a1b6fb9f4f69c3f80aa1
                                  • Instruction ID: e9bf346e62c8f5194ee5324d3baedaa5e6ebd849217ccdd707156ce691e4747f
                                  • Opcode Fuzzy Hash: 5b9c7873e9ac0f4ea87b8cb6eb7bce69d701e774d384a1b6fb9f4f69c3f80aa1
                                  • Instruction Fuzzy Hash: A431B031F142099FCB18CFA4D8A469EB7B6AF89300F10C519EA06E7740DB71AE42CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 746093beb4a6f9db6daf32d072633c13a65177b1e61e42c7da66a14c8c746a71
                                  • Instruction ID: 2d920e6b5a11388ded6c102204547a02173796a3d21de81a3ba550fe311530ec
                                  • Opcode Fuzzy Hash: 746093beb4a6f9db6daf32d072633c13a65177b1e61e42c7da66a14c8c746a71
                                  • Instruction Fuzzy Hash: F7318031F142099BCB58CFA4D89469EB7F6EF89300F218529EA06E7750DB71AD42CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 794a57e2c8fb4fde9499e59317f1c6e7ffabdb67b12ce283c7933a0e3f2ba5df
                                  • Instruction ID: ab549889f69704278eed2a12ddbee72ca51137c4068193b7c72e88f3a5c08265
                                  • Opcode Fuzzy Hash: 794a57e2c8fb4fde9499e59317f1c6e7ffabdb67b12ce283c7933a0e3f2ba5df
                                  • Instruction Fuzzy Hash: BA219A76F11215AFDB41DFA8D880AEEBBF5AB48310F118425E909E7354E734D9028BE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 79183b11596295750edb4839ce4359f60b945038e88cfd0f9fca5285f3e64f96
                                  • Instruction ID: 79e330541897273e907fe19364f41b8a65b06355ac42a39a879e42f072d8e474
                                  • Opcode Fuzzy Hash: 79183b11596295750edb4839ce4359f60b945038e88cfd0f9fca5285f3e64f96
                                  • Instruction Fuzzy Hash: 2421A976F116159FDB50DFA9D880AAEBBF5EB48710F218429EA09E7380E734D8018BD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3261249853.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_107d000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f79ca39565cd2f4546b39beeada5b5798bd49182d4808ff0e47131a64d070c33
                                  • Instruction ID: 21611e260fd16aad922e6b67581222d89238b0fb735d2318087812823d49ad18
                                  • Opcode Fuzzy Hash: f79ca39565cd2f4546b39beeada5b5798bd49182d4808ff0e47131a64d070c33
                                  • Instruction Fuzzy Hash: CF212571904204EFCB16CF68D9C4B26BBA5FF84314F20C5ADE9890B252C73AD446CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b96c6f75bce53402b5ec119b301e84bf2aeef332aae745006946ff7ab6f42813
                                  • Instruction ID: fafb7f6f55dd482654b7f93799d846f8b85f5d0165e898d14ba79a2c8a02d723
                                  • Opcode Fuzzy Hash: b96c6f75bce53402b5ec119b301e84bf2aeef332aae745006946ff7ab6f42813
                                  • Instruction Fuzzy Hash: 4111E132B101284FDF95D778C8146AE73EAABC8310F128539D60AE7344DE69CC028BD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05c3cb390f2fccfa07b109b520c26a7d67903bd56592648e13c92e2dc9159069
                                  • Instruction ID: 119e62a82b8ba5efb2621d30e48d5e3b3a777278fd1b68cc62c95512569e0ed3
                                  • Opcode Fuzzy Hash: 05c3cb390f2fccfa07b109b520c26a7d67903bd56592648e13c92e2dc9159069
                                  • Instruction Fuzzy Hash: 4D012831B141601FDB2192ADA844B6FA7DBCBC6711F25843AF10ACB7A6DA55CD074391
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 874537fc10a86587fa4e6dcfe8ef6040d7de74466806da0923caddf27a9bad9f
                                  • Instruction ID: 8d31b2517d63bf9ea053ca865303c1e3211e43cd902838b9f41bac9385eab6be
                                  • Opcode Fuzzy Hash: 874537fc10a86587fa4e6dcfe8ef6040d7de74466806da0923caddf27a9bad9f
                                  • Instruction Fuzzy Hash: 41012831B142105FCB61A62DEC50B1F3BEADBCA710F214429F10ECB395DA24DC0283D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1518fafafb6869be4a97794705fb95a49dfcfa8a6565707960df722698cdce3d
                                  • Instruction ID: dd9b503940186dce9ad36941aff8b55556a4c8148412493d88ca082d2cf676be
                                  • Opcode Fuzzy Hash: 1518fafafb6869be4a97794705fb95a49dfcfa8a6565707960df722698cdce3d
                                  • Instruction Fuzzy Hash: EF016832B200240BCF52D279DC246EF36ABDBC4310F160439EA0AD7380EB25CC0683D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d31e261256e3bebb54d91ea65da7c5e59cfcd24c4953f306a7bb0b7e4387e7a1
                                  • Instruction ID: e2a10e8de15ba3d807c73b38831a227a04965942966900d94340d3e550759267
                                  • Opcode Fuzzy Hash: d31e261256e3bebb54d91ea65da7c5e59cfcd24c4953f306a7bb0b7e4387e7a1
                                  • Instruction Fuzzy Hash: 0321C0B5D01219AFCB10DF9AD984ADEFBB8FB48310F10812AE518A7200C3796554CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3261249853.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_107d000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction ID: 6db1765e52c1871ebcd60cad4b7a5d0ad9fdf57f7042def622ad44ca08660e2d
                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                  • Instruction Fuzzy Hash: 4111D075904244DFDB12CF54D5C4B15BFA1FF44314F24C6A9E9894B252C33AD44ACFA2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cb492dbb7bfbe7972d3bf2f16a852dab65bbfa568c4b58247f21d1e4404e88ca
                                  • Instruction ID: c2f4a75a331ab4f16b4c3d2df4ca92046038c5e1a8b025b4ed8ce679040f9e4d
                                  • Opcode Fuzzy Hash: cb492dbb7bfbe7972d3bf2f16a852dab65bbfa568c4b58247f21d1e4404e88ca
                                  • Instruction Fuzzy Hash: 9A11D3B1D012199FCB00DF9AD884ADEFBB8FF48310F10812AE518A7200C3796544CFE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b13b4f29d9b545f85811a03a092a9396b5f5de6012b10d8670b1e301bbe497e1
                                  • Instruction ID: da2229393457c705c5d4b9ac51f980c92c01b6cea73ac5399a6a59edd70682ef
                                  • Opcode Fuzzy Hash: b13b4f29d9b545f85811a03a092a9396b5f5de6012b10d8670b1e301bbe497e1
                                  • Instruction Fuzzy Hash: 6201F735F200105BDB61DB6CE494B3E67DADBC9610F25883AE20AC7751EA65DD428381
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b26190b54592f13a7b8ccab8d8453ff22a5790a87ea073289cba3c86192ec081
                                  • Instruction ID: 5cdfe762b5530ade776cd7d0eeba601d5b9d5e4c76fa1cdd4fcc75bb5c64e59b
                                  • Opcode Fuzzy Hash: b26190b54592f13a7b8ccab8d8453ff22a5790a87ea073289cba3c86192ec081
                                  • Instruction Fuzzy Hash: 3301AD31B201100BDB6496AEE44476BB3DECBC9B20F218439E20AC7756DA66DD034392
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4a91ca3ba76fc2726c1c46824ea17052486d9d593a980d49b3f4f5c3b91894c7
                                  • Instruction ID: e9d2e54d4bc812bf6a0f0a367a2c2c8a788da6f74c28cdbc4fe8bdbbd35f4c5a
                                  • Opcode Fuzzy Hash: 4a91ca3ba76fc2726c1c46824ea17052486d9d593a980d49b3f4f5c3b91894c7
                                  • Instruction Fuzzy Hash: B9018135B200101BDB65DA6DE45473E66DADBC9714F21843AE20AC7791EEA5DC424381
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 043a9ec9af2fdf9d1bd42b68a0e3fbd21d771469d19469bb1a328999ec198d1d
                                  • Instruction ID: 3d4d8c9c867bf2b00223ff1edfe984de171f41dc4f34164fb66826d2d1e5d16f
                                  • Opcode Fuzzy Hash: 043a9ec9af2fdf9d1bd42b68a0e3fbd21d771469d19469bb1a328999ec198d1d
                                  • Instruction Fuzzy Hash: 4F01A431B101104FCB65EB6DE850B2E73EAEB8A714F618438E60EC7754EA65EC0287C1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 343c4d71836eb52e69182ce63c89160bd3bcc2678569fb4ddd3e932c84438aa9
                                  • Instruction ID: 53a6a6ab61ce7c911ad8bef950eecfbf2c21040a70a85d9222bdc74aac660bcd
                                  • Opcode Fuzzy Hash: 343c4d71836eb52e69182ce63c89160bd3bcc2678569fb4ddd3e932c84438aa9
                                  • Instruction Fuzzy Hash: 52E06D71E392086BDB60EF659D1965A7A5EDB82214F2248A1D904CB542E276D901C3D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-2843079600
                                  • Opcode ID: a84b65c63dd1938ccf6ab46d0e21f9cd92c5fc5ec063b2b826ce20eeeea0a7c7
                                  • Instruction ID: a1cfdae4f398da8ea24cf7479cbf7147549bfb699e337e779a63451c4b9a4681
                                  • Opcode Fuzzy Hash: a84b65c63dd1938ccf6ab46d0e21f9cd92c5fc5ec063b2b826ce20eeeea0a7c7
                                  • Instruction Fuzzy Hash: 2A124E30E112198FDB68DFA8D990A9DB7F6BF88304F218969D509AB754DB34DD41CF80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-1273862796
                                  • Opcode ID: d1630cc9d023ca0ce1e08954394bb242930cf992ded69c7a5bd30ebf66ec59c4
                                  • Instruction ID: 4f3fec4d6510ff93fc6778236986167e41dcc4d7a1d0a3aa4a6a4c09931ce1ba
                                  • Opcode Fuzzy Hash: d1630cc9d023ca0ce1e08954394bb242930cf992ded69c7a5bd30ebf66ec59c4
                                  • Instruction Fuzzy Hash: 9A919030A20209DFDF68DF68DA80B6E77FAAF84310F218929E549A7754DB34DD45CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                  • API String ID: 0-981061697
                                  • Opcode ID: 65dbfeb7c212ec0e65c708e49f3ecb2f8639c56ce7dbf4d1dff0da581a0b5dff
                                  • Instruction ID: a8f65ddb4f8a8d3cbcd94233a37399880711a4a517a7e08756df08b7a243ae79
                                  • Opcode Fuzzy Hash: 65dbfeb7c212ec0e65c708e49f3ecb2f8639c56ce7dbf4d1dff0da581a0b5dff
                                  • Instruction Fuzzy Hash: E2F16030B11205CFDB59EFA8E590A6EB7B6FF84304F618568E4059B768DB35EC42CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q
                                  • API String ID: 0-858218434
                                  • Opcode ID: 44dcee644ff2f79cab79d89ffa01d1862235bc57e0ae0e5bc7881dba9cbd5a72
                                  • Instruction ID: 37464a7a995cf07620e7c6df91973297014d1729349bb815aa47439846551e88
                                  • Opcode Fuzzy Hash: 44dcee644ff2f79cab79d89ffa01d1862235bc57e0ae0e5bc7881dba9cbd5a72
                                  • Instruction Fuzzy Hash: 8CB16F30B21209CFDB98DFA8DA9465EB7B6FF84304F258429D5059B755DB34DC82CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LR]q$LR]q$$]q$$]q
                                  • API String ID: 0-3527005858
                                  • Opcode ID: a12e7a366f54c1994904a112f159eb2ce639665a6e4946a7de7b483bf975e71a
                                  • Instruction ID: 17ce82450ac12376e8732daaa92c030df90da003cd7b58ebda8be6226025ff21
                                  • Opcode Fuzzy Hash: a12e7a366f54c1994904a112f159eb2ce639665a6e4946a7de7b483bf975e71a
                                  • Instruction Fuzzy Hash: A751C431B202019FDB98DF28DA40A6E77FAFF84304F118968E5169B765DB30EC45CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.3266142327.00000000069F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069F0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_69f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $]q$$]q$$]q$$]q
                                  • API String ID: 0-858218434
                                  • Opcode ID: ba461041e223c83c92e91ae76622b25a314d21d9180d16061a4d013dfafdfe42
                                  • Instruction ID: f68718c3fa23a04b2b7a82e295c274884da9171cb8c6a6d7ca760603c25e7761
                                  • Opcode Fuzzy Hash: ba461041e223c83c92e91ae76622b25a314d21d9180d16061a4d013dfafdfe42
                                  • Instruction Fuzzy Hash: DA517230E20205CFDF69DB68E58066DB7BAEF84311F25892AD909DB754DB34DC41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%