Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
Analysis ID:1431282
MD5:d760dc358592d6717d4d6ca1ca0b4a41
SHA1:c9cecc6110f3568c4b8d38c95f834b3bf7a7c0d8
SHA256:87c5e257097fbb317f8f64250f0796574dfaf1e132e4819dc9c62d9d59c227dd
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "naz@itc-ib.net", "Password": "N@DRpoY0"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2069338415.0000000003F19000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.2073329102.0000000005960000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000005.00000002.3309198673.000000000301E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 9 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 16 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.199.224, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, Initiated: true, ProcessId: 5080, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "naz@itc-ib.net", "Password": "N@DRpoY0"}
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeReversingLabs: Detection: 21%
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeJoe Sandbox ML: detected
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: tRZtZ.pdb source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: Binary string: tRZtZ.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe

                      Networking

                      barindex
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 208.91.199.224:587
                      Source: Joe Sandbox ViewIP Address: 208.91.199.224 208.91.199.224
                      Source: global trafficTCP traffic: 192.168.2.5:49705 -> 208.91.199.224:587
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3315006708.0000000006A10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, cPKWk.cs.Net Code: jKc2cDf

                      System Summary

                      barindex
                      Source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_02D9D5BC0_2_02D9D5BC
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_06058CB80_2_06058CB8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_06059B680_2_06059B68
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605CBC00_2_0605CBC0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605C8A80_2_0605C8A8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_060579C80_2_060579C8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605BE780_2_0605BE78
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_06056EB80_2_06056EB8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_060587180_2_06058718
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605BC300_2_0605BC30
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605AA080_2_0605AA08
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_060582500_2_06058250
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_060500060_2_06050006
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_060500400_2_06050040
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605D8500_2_0605D850
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_0605B8C00_2_0605B8C0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_01674A985_2_01674A98
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_01679C085_2_01679C08
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_01673E805_2_01673E80
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_016741C85_2_016741C8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_0167D2B05_2_0167D2B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_065656D05_2_065656D0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_06562EF05_2_06562EF0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_06563F485_2_06563F48
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_0656BD085_2_0656BD08
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_065605B85_2_065605B8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_06569AE05_2_06569AE0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_06568BA05_2_06568BA0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_065636505_2_06563650
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_06564FF05_2_06564FF0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 5_2_01679C015_2_01679C01
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2063391707.0000000003067000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec85b37e2-75b0-4234-9c02-552db01b2b21.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000000.2049159854.0000000000C3C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenametRZtZ.exen' vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2072063764.0000000004F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2062074347.00000000011CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec85b37e2-75b0-4234-9c02-552db01b2b21.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307195711.000000000043E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec85b37e2-75b0-4234-9c02-552db01b2b21.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307479640.00000000010F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeBinary or memory string: OriginalFilenametRZtZ.exen' vs SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, zrWCPG3dLvJK3EgkMW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, zrWCPG3dLvJK3EgkMW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, d6xQSBapuxcv9EN06s.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5990000.12.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.32eb258.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.2f4f0c8.5.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.2f5f484.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/1@1/1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMutant created: NULL
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeReversingLabs: Detection: 21%
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: tRZtZ.pdb source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                      Source: Binary string: tRZtZ.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe

                      Data Obfuscation

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, Form1.cs.Net Code: InitializeComponent
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, d6xQSBapuxcv9EN06s.cs.Net Code: XF7ni4DdhA System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, d6xQSBapuxcv9EN06s.cs.Net Code: XF7ni4DdhA System.Reflection.Assembly.Load(byte[])
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: 0x83A41C42 [Tue Dec 27 03:47:14 2039 UTC]
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeCode function: 0_2_06053E3A push ds; ret 0_2_06053E3B
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeStatic PE information: section name: .text entropy: 7.9824303162566155
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, tI2pr9waypbr6FZsTC.csHigh entropy of concatenated method names: 'EcwiT8RtC', 'dfxydkXcD', 'wtuVZebXJ', 'C7oWV3uOL', 'q9yl6i5nU', 'zplGiKm3Q', 'mZkcZmPGvxEXLc6w0Q', 'NEJZnripPmBNMLfg4r', 'I8kJjQ2vY', 'pSt9H76Aj'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, cMa5f2nkbwMSJ9jBMr.csHigh entropy of concatenated method names: 'Mr8gQOebUW', 'd1Igrg8pPq', 'KXrgT8M38p', 'QItTMpDnll', 'z2GTzPQC9D', 'BDtgP5rtNP', 'emjgXg30mN', 'v8xgDCPAPF', 'c1Ug7MyFmn', 'RkYgnBfRhs'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, kRMRZ7dipxXsDCZVAAj.csHigh entropy of concatenated method names: 'YshkZuoqxu', 'Ap3kurY9ta', 'RCGki4trOc', 'KX3kyQ0apV', 'AyOkA3G8vr', 'QqqkVVrNe1', 'CTSkW1MQnH', 'bbukpCBgFX', 'NuWklf2UtD', 'sKOkGTt91I'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, EMO7B1gN4QWasy0VHo.csHigh entropy of concatenated method names: 'tEAwpNEmuN', 'X80wlfgN8L', 'pwWwBdItrH', 'FHCw5BuWNh', 'RpSwmByXYc', 'hALwY3Tffv', 'CKZws6Kfcn', 'Dv4wfmcA8W', 'dhnw8RQ2ot', 'EBWwR9kUAq'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, ESd1vpSgRUx49WWX2w.csHigh entropy of concatenated method names: 'SrdJBtGryw', 'kM3J5Mhrky', 'UVUJxYN7Ng', 'mDFJmIYjkH', 'tfmJ6FH4KX', 'wssJYZAavU', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, uQ3W5Ck4LyfS8CSIuG.csHigh entropy of concatenated method names: 'IgYgZFsGUU', 'Pfsgu03RnB', 'qyOgi59VY3', 'pvjgyePU9u', 'bxTgAg05Ki', 'y8igVqSHYi', 'x4RgWshfNQ', 'jXVgpRlvQE', 'RJNglFTlky', 'M8igGGxt76'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, dsn0tHzswp5nEwEdfH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XOJkws8Cjw', 'YJskCXZZni', 'Pf6kFDuYMQ', 'KU9kIk4mPl', 'eYNkJDBV0b', 'hUokk0OZwQ', 'Fkwk9fHcq9'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, zAxcuj6YFTwcHDobjA.csHigh entropy of concatenated method names: 'L9tkXnAfYW', 'FQ8k70nAts', 'eXeknMpEVn', 'mfYkQMOkKv', 'PXOkS42kew', 'AJjkjYdVxg', 'ChpkTe2uoV', 'AffJOdRMeh', 'CSMJNbUiiG', 'j3wJvnOT1j'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, zrWCPG3dLvJK3EgkMW.csHigh entropy of concatenated method names: 'XgxS67tmaY', 'oZlS0YVkry', 'MenSh9QvLQ', 'M7pSLAUGeA', 'VFmSEiOTSR', 'H4PS4rcEFO', 'FerSOHXrUK', 'p7ISNfGRBT', 'O6OSvgnof5', 'MkoSMlH5G6'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, tFeiT0I3vQIcnwVjg1.csHigh entropy of concatenated method names: 'XO2rynXUjt', 'EXlrVjhDBa', 'IQirpcQnGv', 'k41rlkexWU', 'o3xrCkY0ZO', 'cTerFcD5YX', 'wvgrIHackT', 'cCSrJv4Juj', 'jqorklEgUW', 'O5Ar9Pc4lN'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, zmYWwDZ8FykQ1x2sQs.csHigh entropy of concatenated method names: 'sWdIU71xka', 'eRVIdBpZKt', 'ToString', 'ACGIQX1xyj', 'XkAISEuLnx', 'W6TIrUXJ2v', 'CF3IjAWLBb', 'dIIITaXyPL', 'kkBIgNi8Rj', 'yP4IebslcS'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, d6xQSBapuxcv9EN06s.csHigh entropy of concatenated method names: 'GK47thRnjx', 'C9d7QUoPPg', 'KGi7SIXdlR', 'nSQ7rjQmaF', 'FLp7j93riK', 'GWs7T0wim7', 'gvu7gwQ23l', 'iPb7e5q6cZ', 'xD473KCIiE', 'UYX7UlWEHS'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, GIM2cLv1BMT29pRR3L.csHigh entropy of concatenated method names: 'ksmXgysZLR', 'f9oXeZQ0gN', 'THtXU3RK9t', 'G3UXdDJpRH', 'ukpXCj5rRg', 'taXXFLkBnm', 'e0v2hVSQRoJkCTXiCq', 'DxU6WEVZZgNrqnPYyZ', 'XeFXXsDLIa', 'StkX7prSEG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, lOv9FRd2NPqO1PlBJQs.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AU296TyiLY', 'aLZ90BOtxc', 'LWc9hgroNT', 'BYR9LfcXca', 'hXg9Emk8f3', 'llK94PagMR', 'xy39OtJpFF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, PvRT5FjPqtsEToTf1L.csHigh entropy of concatenated method names: 'Dispose', 'JnLXvikI01', 'ROGD5l638m', 'VOcqqYiVvy', 'NgoXMR8YGd', 'a1OXzMgo8Q', 'ProcessDialogKey', 'sCODPDXkAQ', 'PZUDXfDhAG', 'HFjDD72Uvk'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, xd2LSSQnCDksaira0r.csHigh entropy of concatenated method names: 'q6ajANrWej', 'sw0jWud29y', 'KunrxTRIg1', 'cPhrmNmGBk', 'G1erYheLfF', 'H4lrbCVAQ4', 'djVrsujC9n', 'TGYrfaf0ES', 'KNgraLwK2s', 'Wq4r8A8GO5'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, mcWHn487y1glHTYajC.csHigh entropy of concatenated method names: 'AQKTtEwdfP', 'N77TSpYyCx', 'bSkTjKCqxq', 'UgVTgrrsLK', 'uaWTeSgojI', 'gSgjEGQVbs', 'RCGj4DSGZM', 'AiGjO2eK7x', 'YCojNNO8Ko', 'kvbjvmmRyX'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, lxvgevrO2p7UITObwM.csHigh entropy of concatenated method names: 'XaoINRu3E1', 'M5MIMYTfk2', 'B0pJPGxndF', 'ptpJXMXEua', 'tjkIRUAfxe', 'SpVIoG0B2M', 'TJOIHJNsYZ', 'KyyI6gDH1G', 'CUYI03HdA8', 'na0IhsHegn'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, p18Ki8x7X9oUic0XE0.csHigh entropy of concatenated method names: 'v6OJQkepVG', 'e9IJS49Ige', 'YqPJrek7pj', 'gb4JjkxR8m', 'YG9JTa8Acc', 'kSEJg9mI9S', 'wDNJeIPDlR', 'A7dJ3neL8U', 'HcrJUw9mTi', 'vQZJdAR5L3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, YaIa4uHV693HHtPBfY.csHigh entropy of concatenated method names: 'ToString', 'NjBFRXxEq0', 'N8NF5TUrkw', 'xIMFxdyG2t', 'glDFmMjekr', 'vREFYuS4C6', 'xVdFbAtlJ2', 'bPGFsYaa2V', 'knfFfe3bsy', 'qfXFayeQ7Y'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, tI2pr9waypbr6FZsTC.csHigh entropy of concatenated method names: 'EcwiT8RtC', 'dfxydkXcD', 'wtuVZebXJ', 'C7oWV3uOL', 'q9yl6i5nU', 'zplGiKm3Q', 'mZkcZmPGvxEXLc6w0Q', 'NEJZnripPmBNMLfg4r', 'I8kJjQ2vY', 'pSt9H76Aj'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, cMa5f2nkbwMSJ9jBMr.csHigh entropy of concatenated method names: 'Mr8gQOebUW', 'd1Igrg8pPq', 'KXrgT8M38p', 'QItTMpDnll', 'z2GTzPQC9D', 'BDtgP5rtNP', 'emjgXg30mN', 'v8xgDCPAPF', 'c1Ug7MyFmn', 'RkYgnBfRhs'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, kRMRZ7dipxXsDCZVAAj.csHigh entropy of concatenated method names: 'YshkZuoqxu', 'Ap3kurY9ta', 'RCGki4trOc', 'KX3kyQ0apV', 'AyOkA3G8vr', 'QqqkVVrNe1', 'CTSkW1MQnH', 'bbukpCBgFX', 'NuWklf2UtD', 'sKOkGTt91I'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, EMO7B1gN4QWasy0VHo.csHigh entropy of concatenated method names: 'tEAwpNEmuN', 'X80wlfgN8L', 'pwWwBdItrH', 'FHCw5BuWNh', 'RpSwmByXYc', 'hALwY3Tffv', 'CKZws6Kfcn', 'Dv4wfmcA8W', 'dhnw8RQ2ot', 'EBWwR9kUAq'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, ESd1vpSgRUx49WWX2w.csHigh entropy of concatenated method names: 'SrdJBtGryw', 'kM3J5Mhrky', 'UVUJxYN7Ng', 'mDFJmIYjkH', 'tfmJ6FH4KX', 'wssJYZAavU', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, uQ3W5Ck4LyfS8CSIuG.csHigh entropy of concatenated method names: 'IgYgZFsGUU', 'Pfsgu03RnB', 'qyOgi59VY3', 'pvjgyePU9u', 'bxTgAg05Ki', 'y8igVqSHYi', 'x4RgWshfNQ', 'jXVgpRlvQE', 'RJNglFTlky', 'M8igGGxt76'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, dsn0tHzswp5nEwEdfH.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'XOJkws8Cjw', 'YJskCXZZni', 'Pf6kFDuYMQ', 'KU9kIk4mPl', 'eYNkJDBV0b', 'hUokk0OZwQ', 'Fkwk9fHcq9'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, zAxcuj6YFTwcHDobjA.csHigh entropy of concatenated method names: 'L9tkXnAfYW', 'FQ8k70nAts', 'eXeknMpEVn', 'mfYkQMOkKv', 'PXOkS42kew', 'AJjkjYdVxg', 'ChpkTe2uoV', 'AffJOdRMeh', 'CSMJNbUiiG', 'j3wJvnOT1j'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, zrWCPG3dLvJK3EgkMW.csHigh entropy of concatenated method names: 'XgxS67tmaY', 'oZlS0YVkry', 'MenSh9QvLQ', 'M7pSLAUGeA', 'VFmSEiOTSR', 'H4PS4rcEFO', 'FerSOHXrUK', 'p7ISNfGRBT', 'O6OSvgnof5', 'MkoSMlH5G6'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, tFeiT0I3vQIcnwVjg1.csHigh entropy of concatenated method names: 'XO2rynXUjt', 'EXlrVjhDBa', 'IQirpcQnGv', 'k41rlkexWU', 'o3xrCkY0ZO', 'cTerFcD5YX', 'wvgrIHackT', 'cCSrJv4Juj', 'jqorklEgUW', 'O5Ar9Pc4lN'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, zmYWwDZ8FykQ1x2sQs.csHigh entropy of concatenated method names: 'sWdIU71xka', 'eRVIdBpZKt', 'ToString', 'ACGIQX1xyj', 'XkAISEuLnx', 'W6TIrUXJ2v', 'CF3IjAWLBb', 'dIIITaXyPL', 'kkBIgNi8Rj', 'yP4IebslcS'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, d6xQSBapuxcv9EN06s.csHigh entropy of concatenated method names: 'GK47thRnjx', 'C9d7QUoPPg', 'KGi7SIXdlR', 'nSQ7rjQmaF', 'FLp7j93riK', 'GWs7T0wim7', 'gvu7gwQ23l', 'iPb7e5q6cZ', 'xD473KCIiE', 'UYX7UlWEHS'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, GIM2cLv1BMT29pRR3L.csHigh entropy of concatenated method names: 'ksmXgysZLR', 'f9oXeZQ0gN', 'THtXU3RK9t', 'G3UXdDJpRH', 'ukpXCj5rRg', 'taXXFLkBnm', 'e0v2hVSQRoJkCTXiCq', 'DxU6WEVZZgNrqnPYyZ', 'XeFXXsDLIa', 'StkX7prSEG'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, lOv9FRd2NPqO1PlBJQs.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'AU296TyiLY', 'aLZ90BOtxc', 'LWc9hgroNT', 'BYR9LfcXca', 'hXg9Emk8f3', 'llK94PagMR', 'xy39OtJpFF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, PvRT5FjPqtsEToTf1L.csHigh entropy of concatenated method names: 'Dispose', 'JnLXvikI01', 'ROGD5l638m', 'VOcqqYiVvy', 'NgoXMR8YGd', 'a1OXzMgo8Q', 'ProcessDialogKey', 'sCODPDXkAQ', 'PZUDXfDhAG', 'HFjDD72Uvk'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, xd2LSSQnCDksaira0r.csHigh entropy of concatenated method names: 'q6ajANrWej', 'sw0jWud29y', 'KunrxTRIg1', 'cPhrmNmGBk', 'G1erYheLfF', 'H4lrbCVAQ4', 'djVrsujC9n', 'TGYrfaf0ES', 'KNgraLwK2s', 'Wq4r8A8GO5'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, mcWHn487y1glHTYajC.csHigh entropy of concatenated method names: 'AQKTtEwdfP', 'N77TSpYyCx', 'bSkTjKCqxq', 'UgVTgrrsLK', 'uaWTeSgojI', 'gSgjEGQVbs', 'RCGj4DSGZM', 'AiGjO2eK7x', 'YCojNNO8Ko', 'kvbjvmmRyX'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, lxvgevrO2p7UITObwM.csHigh entropy of concatenated method names: 'XaoINRu3E1', 'M5MIMYTfk2', 'B0pJPGxndF', 'ptpJXMXEua', 'tjkIRUAfxe', 'SpVIoG0B2M', 'TJOIHJNsYZ', 'KyyI6gDH1G', 'CUYI03HdA8', 'na0IhsHegn'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, p18Ki8x7X9oUic0XE0.csHigh entropy of concatenated method names: 'v6OJQkepVG', 'e9IJS49Ige', 'YqPJrek7pj', 'gb4JjkxR8m', 'YG9JTa8Acc', 'kSEJg9mI9S', 'wDNJeIPDlR', 'A7dJ3neL8U', 'HcrJUw9mTi', 'vQZJdAR5L3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, YaIa4uHV693HHtPBfY.csHigh entropy of concatenated method names: 'ToString', 'NjBFRXxEq0', 'N8NF5TUrkw', 'xIMFxdyG2t', 'glDFmMjekr', 'vREFYuS4C6', 'xVdFbAtlJ2', 'bPGFsYaa2V', 'knfFfe3bsy', 'qfXFayeQ7Y'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 6620, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 2F10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 4F10000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 6160000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 7160000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 7290000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 8290000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 8900000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 9900000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: A900000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: B900000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 1670000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: 4FD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWindow / User API: threadDelayed 1213Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWindow / User API: threadDelayed 7318Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 5548Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 408Thread sleep count: 1213 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 408Thread sleep count: 7318 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99875s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99641s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99531s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99419s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99188s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -99063s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98938s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98828s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98719s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98601s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98484s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98375s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98266s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98141s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -98031s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97922s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97813s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97688s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97563s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97453s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97344s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97219s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -97000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96891s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96672s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96563s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96438s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96324s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -96000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95891s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95766s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95547s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95438s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -95313s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe TID: 2704Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99875Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99766Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99641Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99531Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99419Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99313Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99188Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 99063Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98938Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98828Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98719Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98601Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98484Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98375Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98266Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98141Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 98031Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97922Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97813Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97688Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97563Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97453Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97344Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97219Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97109Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 97000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96891Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96781Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96672Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96563Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96438Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96324Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96218Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96109Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 96000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95891Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95766Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95656Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95547Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95438Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 95313Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllKLR'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3309198673.000000000301E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3309198673.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 6620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 5080, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2069338415.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2073329102.0000000005960000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3309198673.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 6620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 5080, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 5.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b94cb0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4c130d0.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.4b16890.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000005.00000002.3309198673.000000000301E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3309198673.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 6620, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe PID: 5080, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.5960000.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe.3f19970.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2069338415.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2073329102.0000000005960000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Input Capture
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                      Obfuscated Files or Information
                      1
                      Credentials in Registry
                      1
                      Query Registry
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS111
                      Security Software Discovery
                      Distributed Component Object Model1
                      Input Capture
                      11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Timestomp
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Masquerading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe21%ReversingLabs
                      SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                      http://ocsp.sectigo.com0A0%URL Reputationsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      us2.smtp.mailhostbox.com
                      208.91.199.224
                      truefalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0ASecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://sectigo.com/CPS0SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307591782.000000000123F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://us2.smtp.mailhostbox.comSecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe, 00000005.00000002.3309198673.0000000003026000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.91.199.224
                            us2.smtp.mailhostbox.comUnited States
                            394695PUBLIC-DOMAIN-REGISTRYUSfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1431282
                            Start date and time:2024-04-24 19:23:09 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 36s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@9/1@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 85
                            • Number of non-executed functions: 11
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                            TimeTypeDescription
                            19:24:02API Interceptor43x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.91.199.224OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                              Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                  HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                    TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                      rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                          HmGUCvTQIacWu7Q.exeGet hashmaliciousAgentTeslaBrowse
                                            Payment.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                              Gcerti Quote.exeGet hashmaliciousAgentTeslaBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                us2.smtp.mailhostbox.comDhl Express Shipping Docs .pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.198.143
                                                HDPESDR1145-6METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.225
                                                TT copy of the first payment.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.198.143
                                                rTDN001-180424_PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 208.91.198.143
                                                1iO53raUh69l6nV.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                HmGUCvTQIacWu7Q.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                PUBLIC-DOMAIN-REGISTRYUSDhl Express Shipping Docs .pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                • 207.174.215.249
                                                PR2403016.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.223
                                                BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                • 207.174.215.249
                                                OKJ2402PRT000025.PDF.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                PO82100088.exeGet hashmaliciousAgentTeslaBrowse
                                                • 199.79.62.115
                                                BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                                • 162.215.248.214
                                                Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                72625413524.vbsGet hashmaliciousXWormBrowse
                                                • 116.206.104.215
                                                HDPESDR11OD5606METERS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 208.91.199.224
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.976685914003112
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                File size:692'224 bytes
                                                MD5:d760dc358592d6717d4d6ca1ca0b4a41
                                                SHA1:c9cecc6110f3568c4b8d38c95f834b3bf7a7c0d8
                                                SHA256:87c5e257097fbb317f8f64250f0796574dfaf1e132e4819dc9c62d9d59c227dd
                                                SHA512:b32aad32df292055078aa2a5f98205da2fef69f183d8feaf2e79e2cc085430c80feb2560ebc733f6b2c5a994bfc5438071ddf40cd6c588ac5609a2676758290a
                                                SSDEEP:12288:jAlv312Z3HmMPKvWPRqYtuJu+OixvozCaRXrJ6hVxB+8i53tzL73EmlPTS2b:jAJ312ZHmMi+PoYb+rw7XFcfB+B5RLDH
                                                TLSH:FCE4237C22D9532AD97BBBFC24BAC1208365A0A15922D75C0E5673EF43FB7044D46637
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...B.................0.............f.... ........@.. ....................................@................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x4aa366
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x83A41C42 [Tue Dec 27 03:47:14 2039 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                inc esi
                                                dec edi
                                                push edx
                                                xor al, 54h
                                                xor eax, 42384738h
                                                aaa
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [edi], dh
                                                cmp byte ptr [ecx+50h], dl
                                                xor eax, 36374734h
                                                pop edx
                                                inc ebx
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xaa3110x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x61c.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xa8f480x70.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xa838c0xa8400f7f8b46f551196f96138fc3d31127af1False0.9777175427191679data7.9824303162566155IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xac0000x61c0x8005ad9e0c4232e6c9f3c3c57898ff1a084False0.3369140625data3.4723738545851126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xae0000xc0x2005a024fe4d8fc67b74ae9ede688871da2False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0xac0900x38cPGP symmetric key encrypted data - Plaintext or unencrypted data0.42180616740088106
                                                RT_MANIFEST0xac42c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 24, 2024 19:24:04.923279047 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:05.104754925 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:05.112118959 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:05.634308100 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:05.635257006 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:05.816601038 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:05.816859007 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:05.817056894 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:05.998533010 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.005785942 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.187973022 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.188041925 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.188083887 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.188158989 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.188379049 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.188422918 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.369853973 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.406054974 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.588268042 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.603941917 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.785789013 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.786993980 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:06.974595070 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:06.975929976 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:07.196598053 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.128432989 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.128782988 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:09.309954882 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.313026905 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.313285112 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:09.513117075 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.523334980 CEST49705587192.168.2.5208.91.199.224
                                                Apr 24, 2024 19:24:09.714706898 CEST58749705208.91.199.224192.168.2.5
                                                Apr 24, 2024 19:24:09.714772940 CEST49705587192.168.2.5208.91.199.224
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 24, 2024 19:24:04.741357088 CEST6104653192.168.2.51.1.1.1
                                                Apr 24, 2024 19:24:04.899668932 CEST53610461.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Apr 24, 2024 19:24:04.741357088 CEST192.168.2.51.1.1.10xd364Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Apr 24, 2024 19:24:04.899668932 CEST1.1.1.1192.168.2.50xd364No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                                Apr 24, 2024 19:24:04.899668932 CEST1.1.1.1192.168.2.50xd364No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                                Apr 24, 2024 19:24:04.899668932 CEST1.1.1.1192.168.2.50xd364No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                                Apr 24, 2024 19:24:04.899668932 CEST1.1.1.1192.168.2.50xd364No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Apr 24, 2024 19:24:05.634308100 CEST58749705208.91.199.224192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                                Apr 24, 2024 19:24:05.635257006 CEST49705587192.168.2.5208.91.199.224EHLO 123716
                                                Apr 24, 2024 19:24:05.816859007 CEST58749705208.91.199.224192.168.2.5250-us2.outbound.mailhostbox.com
                                                250-PIPELINING
                                                250-SIZE 41648128
                                                250-VRFY
                                                250-ETRN
                                                250-STARTTLS
                                                250-AUTH PLAIN LOGIN
                                                250-AUTH=PLAIN LOGIN
                                                250-ENHANCEDSTATUSCODES
                                                250-8BITMIME
                                                250-DSN
                                                250 CHUNKING
                                                Apr 24, 2024 19:24:05.817056894 CEST49705587192.168.2.5208.91.199.224STARTTLS
                                                Apr 24, 2024 19:24:05.998533010 CEST58749705208.91.199.224192.168.2.5220 2.0.0 Ready to start TLS

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:19:24:01
                                                Start date:24/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                                                Imagebase:0xb90000
                                                File size:692'224 bytes
                                                MD5 hash:D760DC358592D6717D4D6CA1CA0B4A41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2069338415.0000000003F19000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2073329102.0000000005960000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2069338415.0000000004907000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:19:24:02
                                                Start date:24/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                                                Imagebase:0x320000
                                                File size:692'224 bytes
                                                MD5 hash:D760DC358592D6717D4D6CA1CA0B4A41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:3
                                                Start time:19:24:02
                                                Start date:24/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                                                Imagebase:0x230000
                                                File size:692'224 bytes
                                                MD5 hash:D760DC358592D6717D4D6CA1CA0B4A41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:19:24:02
                                                Start date:24/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                                                Imagebase:0x50000
                                                File size:692'224 bytes
                                                MD5 hash:D760DC358592D6717D4D6CA1CA0B4A41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:5
                                                Start time:19:24:02
                                                Start date:24/04/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.29608.5434.exe"
                                                Imagebase:0xca0000
                                                File size:692'224 bytes
                                                MD5 hash:D760DC358592D6717D4D6CA1CA0B4A41
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3309198673.000000000301E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3307195711.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3309198673.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.3309198673.0000000002FD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:7.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:84
                                                  Total number of Limit Nodes:4
                                                  execution_graph 18187 2d94668 18188 2d9467a 18187->18188 18189 2d94686 18188->18189 18193 2d94779 18188->18193 18198 2d93e34 18189->18198 18191 2d946a5 18194 2d9479d 18193->18194 18202 2d94879 18194->18202 18206 2d94888 18194->18206 18199 2d93e3f 18198->18199 18214 2d95c44 18199->18214 18201 2d97048 18201->18191 18204 2d94888 18202->18204 18203 2d9498c 18203->18203 18204->18203 18210 2d944b4 18204->18210 18207 2d948af 18206->18207 18208 2d944b4 CreateActCtxA 18207->18208 18209 2d9498c 18207->18209 18208->18209 18211 2d95918 CreateActCtxA 18210->18211 18213 2d959db 18211->18213 18215 2d95c4f 18214->18215 18218 2d95c64 18215->18218 18217 2d970ed 18217->18201 18219 2d95c6f 18218->18219 18222 2d95c94 18219->18222 18221 2d971c2 18221->18217 18223 2d95c9f 18222->18223 18226 2d95cc4 18223->18226 18225 2d972c5 18225->18221 18227 2d95ccf 18226->18227 18229 2d985cb 18227->18229 18232 2d9ac78 18227->18232 18228 2d98609 18228->18225 18229->18228 18236 2d9cd7c 18229->18236 18241 2d9acb0 18232->18241 18244 2d9aca0 18232->18244 18233 2d9ac8e 18233->18229 18237 2d9cd99 18236->18237 18238 2d9cdbd 18237->18238 18268 2d9cf28 18237->18268 18272 2d9cf19 18237->18272 18238->18228 18248 2d9ada8 18241->18248 18242 2d9acbf 18242->18233 18245 2d9acb0 18244->18245 18247 2d9ada8 2 API calls 18245->18247 18246 2d9acbf 18246->18233 18247->18246 18249 2d9adb9 18248->18249 18250 2d9addc 18248->18250 18249->18250 18256 2d9b040 18249->18256 18260 2d9b030 18249->18260 18250->18242 18251 2d9add4 18251->18250 18252 2d9afe0 GetModuleHandleW 18251->18252 18253 2d9b00d 18252->18253 18253->18242 18257 2d9b054 18256->18257 18259 2d9b079 18257->18259 18264 2d9a130 18257->18264 18259->18251 18261 2d9b054 18260->18261 18262 2d9a130 LoadLibraryExW 18261->18262 18263 2d9b079 18261->18263 18262->18263 18263->18251 18265 2d9b220 LoadLibraryExW 18264->18265 18267 2d9b299 18265->18267 18267->18259 18269 2d9cf35 18268->18269 18270 2d9cf6f 18269->18270 18276 2d9bae0 18269->18276 18270->18238 18273 2d9cf35 18272->18273 18274 2d9cf6f 18273->18274 18275 2d9bae0 2 API calls 18273->18275 18274->18238 18275->18274 18277 2d9baeb 18276->18277 18279 2d9dc88 18277->18279 18280 2d9d2dc 18277->18280 18279->18279 18281 2d9d2e7 18280->18281 18282 2d95cc4 2 API calls 18281->18282 18283 2d9dcf7 18282->18283 18283->18279 18185 2d9d690 DuplicateHandle 18186 2d9d726 18185->18186 18284 2d9d040 18285 2d9d086 GetCurrentProcess 18284->18285 18287 2d9d0d8 GetCurrentThread 18285->18287 18288 2d9d0d1 18285->18288 18289 2d9d10e 18287->18289 18290 2d9d115 GetCurrentProcess 18287->18290 18288->18287 18289->18290 18291 2d9d14b 18290->18291 18292 2d9d173 GetCurrentThreadId 18291->18292 18293 2d9d1a4 18292->18293

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 60579c8-60579eb 339 60579f2-6057a68 338->339 340 60579ed 338->340 345 6057a6b 339->345 340->339 346 6057a72-6057a8e 345->346 347 6057a97-6057a98 346->347 348 6057a90 346->348 350 6057be6-6057c58 call 6058cb8 347->350 348->345 348->347 349 6057ab4-6057af3 348->349 348->350 351 6057a9d-6057ab2 348->351 352 6057b3f-6057b69 348->352 353 6057b6e-6057ba4 348->353 354 6057ba9-6057bc5 348->354 355 6057af8-6057afc 348->355 356 6057b28-6057b3a 348->356 357 6057bca-6057be1 348->357 349->346 370 6057c5e-6057c68 350->370 351->346 352->346 353->346 354->346 358 6057b0f-6057b16 355->358 359 6057afe-6057b0d 355->359 356->346 357->346 365 6057b1d-6057b23 358->365 359->365 365->346
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Te]q$Te]q$)"
                                                  • API String ID: 0-1081650559
                                                  • Opcode ID: a88e13c99fc5c2953b9bbb98625bef12092396d68a9a9e80105e78c947415bd6
                                                  • Instruction ID: fe5e65a76044a4d98058e3e343215405aa68e4c31dde1a6a69df529e257e01a1
                                                  • Opcode Fuzzy Hash: a88e13c99fc5c2953b9bbb98625bef12092396d68a9a9e80105e78c947415bd6
                                                  • Instruction Fuzzy Hash: 9381C574E002098FDB48CFAAC984AEEFBB2FF89300F14952AD415AB354E7359945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 542 6059b68-6059b8d 543 6059b94-6059bd2 call 605a1a8 542->543 544 6059b8f 542->544 546 6059bd8 543->546 544->543 547 6059bdf-6059bfb 546->547 548 6059c04-6059c05 547->548 549 6059bfd 547->549 558 6059f94-6059fa7 548->558 549->546 549->548 550 6059c87-6059c90 549->550 551 6059f03-6059f10 549->551 552 6059dcc-6059de1 549->552 553 6059ecc-6059ed8 549->553 554 6059e49-6059e55 549->554 555 6059f48-6059f5f 549->555 556 6059c0a-6059c21 549->556 557 6059f15-6059f27 549->557 549->558 559 6059e16-6059e2b 549->559 560 6059c50-6059c5c 549->560 561 6059f64-6059f68 549->561 562 6059ea7-6059ec7 549->562 563 6059da7-6059dc7 549->563 564 6059de6-6059dea 549->564 565 6059d66-6059d78 549->565 566 6059ce1-6059ced 549->566 567 6059c23-6059c27 549->567 568 6059f2c-6059f43 549->568 569 6059e30-6059e44 549->569 570 6059d32-6059d3e 549->570 571 6059e7d-6059e89 549->571 572 6059d7d-6059d89 549->572 573 6059cbc-6059cdc 549->573 594 6059ca3-6059caa 550->594 595 6059c92-6059ca1 550->595 551->547 552->547 588 6059edf-6059efe 553->588 589 6059eda 553->589 580 6059e57 554->580 581 6059e5c-6059e78 554->581 555->547 556->547 557->547 559->547 592 6059c63-6059c82 560->592 593 6059c5e 560->593 574 6059f7b-6059f82 561->574 575 6059f6a-6059f79 561->575 562->547 563->547 576 6059dfd-6059e04 564->576 577 6059dec-6059dfb 564->577 565->547 578 6059cf4-6059d0a 566->578 579 6059cef 566->579 586 6059c29-6059c38 567->586 587 6059c3a-6059c41 567->587 568->547 569->547 584 6059d45-6059d61 570->584 585 6059d40 570->585 582 6059e90-6059ea2 571->582 583 6059e8b 571->583 590 6059d90-6059da2 572->590 591 6059d8b 572->591 573->547 597 6059f89-6059f8f 574->597 575->597 601 6059e0b-6059e11 576->601 577->601 611 6059d11-6059d2d 578->611 612 6059d0c 578->612 579->578 580->581 581->547 582->547 583->582 584->547 585->584 603 6059c48-6059c4e 586->603 587->603 588->547 589->588 590->547 591->590 592->547 593->592 596 6059cb1-6059cb7 594->596 595->596 596->547 597->547 601->547 603->547 611->547 612->611
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tIh
                                                  • API String ID: 0-443931868
                                                  • Opcode ID: f46927bda1cbed4854c8f23e873dea736556471db72303458082adb32db976fe
                                                  • Instruction ID: 2df05d1ec33e61bf3c410d9d5e99de11a1c749683c56bf8123090141cf77dc30
                                                  • Opcode Fuzzy Hash: f46927bda1cbed4854c8f23e873dea736556471db72303458082adb32db976fe
                                                  • Instruction Fuzzy Hash: 9FD12870E1424ADFEB48DFA9C5858AEFFB2FF88301B11D555D815AB214D734AA82CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 48152d9bb83dfb82eb84a0b87b206aab1a99a25632ea00b0151a9244effd7e4a
                                                  • Instruction ID: 3d4f9c601e8bfe3f04213473cdd79a7ed80fc51f97d94e207b0a8b5df9a61c50
                                                  • Opcode Fuzzy Hash: 48152d9bb83dfb82eb84a0b87b206aab1a99a25632ea00b0151a9244effd7e4a
                                                  • Instruction Fuzzy Hash: 51910570E55209DFEB48CFA9D58099EFFB2FB89300F21A41AE416BB224D7349945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6a2ea91cfadfb951c8026af1240b6cadff4f5271eb876e8dd4a07a1dc60ba374
                                                  • Instruction ID: 0479ee14904acda5f356f31320abfb3028bbfc0f78830329d7526d5336491ba5
                                                  • Opcode Fuzzy Hash: 6a2ea91cfadfb951c8026af1240b6cadff4f5271eb876e8dd4a07a1dc60ba374
                                                  • Instruction Fuzzy Hash: 34810FB4E44229DFEB44CFA9C8849EEBBB2FB89300F10951AD812B7254D7349952CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d7f754ab58f7dab7a57d906007d6b632fb6822e3dccd513e37e8b9511c5d52fd
                                                  • Instruction ID: b599bfb100a886017f5c431397dd3dfd54190b67cdc014f515cfb8d89b2e56c7
                                                  • Opcode Fuzzy Hash: d7f754ab58f7dab7a57d906007d6b632fb6822e3dccd513e37e8b9511c5d52fd
                                                  • Instruction Fuzzy Hash: 2321E9B1E016588BEB58CF9BD8402DEFBF7AFC8310F14C16AD909A6258DB741A55CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 294 2d9d031-2d9d0cf GetCurrentProcess 298 2d9d0d8-2d9d10c GetCurrentThread 294->298 299 2d9d0d1-2d9d0d7 294->299 300 2d9d10e-2d9d114 298->300 301 2d9d115-2d9d149 GetCurrentProcess 298->301 299->298 300->301 303 2d9d14b-2d9d151 301->303 304 2d9d152-2d9d16d call 2d9d618 301->304 303->304 306 2d9d173-2d9d1a2 GetCurrentThreadId 304->306 308 2d9d1ab-2d9d20d 306->308 309 2d9d1a4-2d9d1aa 306->309 309->308
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 02D9D0BE
                                                  • GetCurrentThread.KERNEL32 ref: 02D9D0FB
                                                  • GetCurrentProcess.KERNEL32 ref: 02D9D138
                                                  • GetCurrentThreadId.KERNEL32 ref: 02D9D191
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: 189b2314b8f3db3eeb55e99de2ac06236c01ef901f61843790bc2a6b62b6a2f1
                                                  • Instruction ID: 7d3ff427c3b70acc11149d2225512497f0b26a402d1d9dcb9a4bef99f8f6ce50
                                                  • Opcode Fuzzy Hash: 189b2314b8f3db3eeb55e99de2ac06236c01ef901f61843790bc2a6b62b6a2f1
                                                  • Instruction Fuzzy Hash: 645168B1A003498FDB54DFA9D648BAEBBF2FF89304F208459E109A7390D7345984CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 316 2d9d040-2d9d0cf GetCurrentProcess 320 2d9d0d8-2d9d10c GetCurrentThread 316->320 321 2d9d0d1-2d9d0d7 316->321 322 2d9d10e-2d9d114 320->322 323 2d9d115-2d9d149 GetCurrentProcess 320->323 321->320 322->323 325 2d9d14b-2d9d151 323->325 326 2d9d152-2d9d16d call 2d9d618 323->326 325->326 328 2d9d173-2d9d1a2 GetCurrentThreadId 326->328 330 2d9d1ab-2d9d20d 328->330 331 2d9d1a4-2d9d1aa 328->331 331->330
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 02D9D0BE
                                                  • GetCurrentThread.KERNEL32 ref: 02D9D0FB
                                                  • GetCurrentProcess.KERNEL32 ref: 02D9D138
                                                  • GetCurrentThreadId.KERNEL32 ref: 02D9D191
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID:
                                                  • API String ID: 2063062207-0
                                                  • Opcode ID: d144454244309e4740460a56a25310e19ced7e671f5b6c01d86029e430d98f28
                                                  • Instruction ID: 16bc56233a07de6b0b3b27fef59a1e806df3ec11b9fa63cd84e4cc3fd3f4cd57
                                                  • Opcode Fuzzy Hash: d144454244309e4740460a56a25310e19ced7e671f5b6c01d86029e430d98f28
                                                  • Instruction Fuzzy Hash: CF5167B1A003498FDB54DFAAD548BAEBBF6FF88304F208459E109A7350D7345984CF65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 394 605a1a8-605a1c6 395 605a1cd-605a1d5 call 605a2a0 394->395 396 605a1c8 394->396 397 605a1db 395->397 396->395 398 605a1e2-605a1fe 397->398 399 605a207-605a208 398->399 400 605a200 398->400 401 605a275-605a279 399->401 400->397 400->399 400->401 402 605a24e-605a270 400->402 403 605a20a-605a21e 400->403 402->398 405 605a231-605a238 403->405 406 605a220-605a22f 403->406 407 605a23f-605a24c 405->407 406->407 407->398
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 3H5$3H5
                                                  • API String ID: 0-2752242361
                                                  • Opcode ID: 8bd911ef7635f6cf9a4ffa1bd6503d790c352bf4227062cf7aa22cda98e5975b
                                                  • Instruction ID: 4e0f87d16ecc2eb4c053784c82fb310c7af774e6e9c6df25b6342228369dcbe8
                                                  • Opcode Fuzzy Hash: 8bd911ef7635f6cf9a4ffa1bd6503d790c352bf4227062cf7aa22cda98e5975b
                                                  • Instruction Fuzzy Hash: 88212A70E14209DFDB88DFAAC5419AEFFF1FF89300F24C56A9908A7214E7349A45CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 409 2d9ada8-2d9adb7 410 2d9adb9-2d9adc6 call 2d9a0cc 409->410 411 2d9ade3-2d9ade7 409->411 416 2d9adc8 410->416 417 2d9addc 410->417 413 2d9ade9-2d9adf3 411->413 414 2d9adfb-2d9ae3c 411->414 413->414 420 2d9ae49-2d9ae57 414->420 421 2d9ae3e-2d9ae46 414->421 466 2d9adce call 2d9b040 416->466 467 2d9adce call 2d9b030 416->467 417->411 422 2d9ae59-2d9ae5e 420->422 423 2d9ae7b-2d9ae7d 420->423 421->420 425 2d9ae69 422->425 426 2d9ae60-2d9ae67 call 2d9a0d8 422->426 428 2d9ae80-2d9ae87 423->428 424 2d9add4-2d9add6 424->417 427 2d9af18-2d9af94 424->427 430 2d9ae6b-2d9ae79 425->430 426->430 459 2d9afc0-2d9afd8 427->459 460 2d9af96-2d9afbe 427->460 431 2d9ae89-2d9ae91 428->431 432 2d9ae94-2d9ae9b 428->432 430->428 431->432 434 2d9aea8-2d9aeaa call 2d9a0e8 432->434 435 2d9ae9d-2d9aea5 432->435 438 2d9aeaf-2d9aeb1 434->438 435->434 440 2d9aebe-2d9aec3 438->440 441 2d9aeb3-2d9aebb 438->441 442 2d9aee1-2d9aeee 440->442 443 2d9aec5-2d9aecc 440->443 441->440 450 2d9af11-2d9af17 442->450 451 2d9aef0-2d9af0e 442->451 443->442 445 2d9aece-2d9aede call 2d9a0f8 call 2d9a108 443->445 445->442 451->450 461 2d9afda-2d9afdd 459->461 462 2d9afe0-2d9b00b GetModuleHandleW 459->462 460->459 461->462 463 2d9b00d-2d9b013 462->463 464 2d9b014-2d9b028 462->464 463->464 466->424 467->424
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02D9AFFE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: 76886676a5833165123e3ce80675f01e7dfeb0072fdc186712dff356ea1b3ed8
                                                  • Instruction ID: bef1ea2bb0d109a953b085df25eb6d951318f25641f6c1013ce1b7a39a441f85
                                                  • Opcode Fuzzy Hash: 76886676a5833165123e3ce80675f01e7dfeb0072fdc186712dff356ea1b3ed8
                                                  • Instruction Fuzzy Hash: 8B813471A00B058FDB24DF29D55479ABBF5FF88304F108A2EE48A9BB50D735E949CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 468 2d9590c-2d95914 469 2d958b0-2d958d9 468->469 470 2d95916-2d959d9 CreateActCtxA 468->470 473 2d958db-2d958e1 469->473 474 2d958e2-2d95903 469->474 475 2d959db-2d959e1 470->475 476 2d959e2-2d95a3c 470->476 473->474 475->476 484 2d95a4b-2d95a4f 476->484 485 2d95a3e-2d95a41 476->485 486 2d95a51-2d95a5d 484->486 487 2d95a60-2d95a90 484->487 485->484 486->487 491 2d95a42-2d95a47 487->491 492 2d95a92-2d95b14 487->492 491->484
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 02D959C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 9d50ff863b0edf1ab128905f0e705bb33b028c3dbd14682c77fc6853f9aaaf80
                                                  • Instruction ID: 84a2a801366f3a0a76bf3bdca7f3665cfeb82a2299087fc81e9cb8f92dd254ab
                                                  • Opcode Fuzzy Hash: 9d50ff863b0edf1ab128905f0e705bb33b028c3dbd14682c77fc6853f9aaaf80
                                                  • Instruction Fuzzy Hash: 605123B1C00719CEDB25DFAAD8847DEBBF5BF49304F60806AD009AB251C7756949CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 495 2d944b4-2d959d9 CreateActCtxA 498 2d959db-2d959e1 495->498 499 2d959e2-2d95a3c 495->499 498->499 506 2d95a4b-2d95a4f 499->506 507 2d95a3e-2d95a41 499->507 508 2d95a51-2d95a5d 506->508 509 2d95a60-2d95a90 506->509 507->506 508->509 513 2d95a42-2d95a47 509->513 514 2d95a92-2d95b14 509->514 513->506
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 02D959C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: 2107ebd187239d436b18cc6ae48c6938e7c2f9383e1848a429a68fde77dd4efc
                                                  • Instruction ID: 0694907830108c85d85d74d925ac13f3c977fa122ea4fe252cd2f018fc5f1ad7
                                                  • Opcode Fuzzy Hash: 2107ebd187239d436b18cc6ae48c6938e7c2f9383e1848a429a68fde77dd4efc
                                                  • Instruction Fuzzy Hash: A04112B0C0071DCFDB25DFA9C984B8EBBB5BF49304F20806AE409AB254DB756949CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 522 2d9d690-2d9d724 DuplicateHandle 523 2d9d72d-2d9d74a 522->523 524 2d9d726-2d9d72c 522->524 524->523
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D9D717
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 9733d814428654c9afcc92b7bbd46ff7144c764684e8a390fdbda22b9ee8ae46
                                                  • Instruction ID: 00eb8e82dd7292c1434e07d1ac2d6e062d73a0948eb98d2417f54db1b0d0d5c3
                                                  • Opcode Fuzzy Hash: 9733d814428654c9afcc92b7bbd46ff7144c764684e8a390fdbda22b9ee8ae46
                                                  • Instruction Fuzzy Hash: 8521E4B59002489FDB10CF9AD584ADEFBF9FB48310F14841AE918A3310C379A940CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 517 2d9d689-2d9d724 DuplicateHandle 518 2d9d72d-2d9d74a 517->518 519 2d9d726-2d9d72c 517->519 519->518
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02D9D717
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 859ee3a8d9629071c6193f30fbc8ba32236a95d94321363f3095d47e32e928cc
                                                  • Instruction ID: f042e20ca07b96788327f351669550910e065db298d48b42e04b16098926939b
                                                  • Opcode Fuzzy Hash: 859ee3a8d9629071c6193f30fbc8ba32236a95d94321363f3095d47e32e928cc
                                                  • Instruction Fuzzy Hash: FA21E0B59002489FDB10CFAAD584AEEBBF5FB48314F14841AE918B3310D378A940CFA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 527 2d9a130-2d9b260 529 2d9b268-2d9b297 LoadLibraryExW 527->529 530 2d9b262-2d9b265 527->530 531 2d9b299-2d9b29f 529->531 532 2d9b2a0-2d9b2bd 529->532 530->529 531->532
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D9B079,00000800,00000000,00000000), ref: 02D9B28A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: b08cce651b7f7013bdf2dc6ec20fcd33165f7535f91d41623874750b1a71a8db
                                                  • Instruction ID: cd56fc8e4b86ea86fecc599e4f0fdc323aa31d0061fb3d45d5f6ab1546ba3a7a
                                                  • Opcode Fuzzy Hash: b08cce651b7f7013bdf2dc6ec20fcd33165f7535f91d41623874750b1a71a8db
                                                  • Instruction Fuzzy Hash: E51112B69003089FDB10CF9AD444AAEFBF4EB48714F10842AE519A7310C379A944CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 535 2d9b219-2d9b260 536 2d9b268-2d9b297 LoadLibraryExW 535->536 537 2d9b262-2d9b265 535->537 538 2d9b299-2d9b29f 536->538 539 2d9b2a0-2d9b2bd 536->539 537->536 538->539
                                                  APIs
                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D9B079,00000800,00000000,00000000), ref: 02D9B28A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: 347a21a7648ded1295c6ff3afabc8f8027964e64f627f44aab650e106eb18727
                                                  • Instruction ID: 254b238c4d04746e66ed4d3b25f1701ae4145271f05480945d65ba09c8bac0c4
                                                  • Opcode Fuzzy Hash: 347a21a7648ded1295c6ff3afabc8f8027964e64f627f44aab650e106eb18727
                                                  • Instruction Fuzzy Hash: 2E1112B69002498FDB10DF9AD448ADEFBF4EB49314F14846AE919A7310C379A945CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 615 2d9af98-2d9afd8 616 2d9afda-2d9afdd 615->616 617 2d9afe0-2d9b00b GetModuleHandleW 615->617 616->617 618 2d9b00d-2d9b013 617->618 619 2d9b014-2d9b028 617->619 618->619
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02D9AFFE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID:
                                                  • API String ID: 4139908857-0
                                                  • Opcode ID: f3176eb4b79c5e93aae80628501c724349937be4c95e3e7fd869b7d29b0ecaa6
                                                  • Instruction ID: 7eae6149f00a54fad998cade4d811334b5ef164ce295d8f8a7579ce8c51db9f5
                                                  • Opcode Fuzzy Hash: f3176eb4b79c5e93aae80628501c724349937be4c95e3e7fd869b7d29b0ecaa6
                                                  • Instruction Fuzzy Hash: 3A110FB6C003498FDB10CF9AD444A9EFBF4EF89218F20845AE528A7310C379A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: O};5
                                                  • API String ID: 0-3558557551
                                                  • Opcode ID: 8f613903af3e091e58f4e77c9d4d5a7403bfcb2edc1b80b22ed45f615a341b87
                                                  • Instruction ID: 3959fad7596839d7a3b785cf67b9a298250173d922bc732722611564ea44aa24
                                                  • Opcode Fuzzy Hash: 8f613903af3e091e58f4e77c9d4d5a7403bfcb2edc1b80b22ed45f615a341b87
                                                  • Instruction Fuzzy Hash: 00415D70A25209DFDB88CF99D5858AFBFB1FB88300B61D899D445A7314DB30DA61CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8aq
                                                  • API String ID: 0-538729646
                                                  • Opcode ID: f5fcb98453bfba95eccb31e139e3a8da2502d0bc18ddf1d2daf5ba708011110c
                                                  • Instruction ID: 2da10b5fa35543babbed6afd264feabe26b9f4dbb4e728e3a1a7374f9977843b
                                                  • Opcode Fuzzy Hash: f5fcb98453bfba95eccb31e139e3a8da2502d0bc18ddf1d2daf5ba708011110c
                                                  • Instruction Fuzzy Hash: EC31E274E542099FDB88EFA8D8506EEBBB5FB98300F11802AD919A3384EB345945CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Te]q
                                                  • API String ID: 0-52440209
                                                  • Opcode ID: 938d0f4b83e7480b1c11926c2fb6cd28c62e15fe1ddaf8379a88d9bf06a5e669
                                                  • Instruction ID: a602b17d6b9e60cd5b34d0527eb9d89b3d5e3a82a900bef70e273d7146a69c99
                                                  • Opcode Fuzzy Hash: 938d0f4b83e7480b1c11926c2fb6cd28c62e15fe1ddaf8379a88d9bf06a5e669
                                                  • Instruction Fuzzy Hash: DD113D31E0020A8BCB84EBA999115EFBAF6AFC8711B514179C945E7244EB318E02CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 265e21a666c48c5ea6fa779493d460fc3a59a50296c2b3ca335a1f9c2ef5189e
                                                  • Instruction ID: fc5b8e91ca67ae367ba9edd08d2bde4d07339448dfd919f6aed3a2d6ad7751dc
                                                  • Opcode Fuzzy Hash: 265e21a666c48c5ea6fa779493d460fc3a59a50296c2b3ca335a1f9c2ef5189e
                                                  • Instruction Fuzzy Hash: 78416974E1020A9FDB48CFA9D8419EFBFB2EB89310F10952AE505AB354DB749A51CFD0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062540361.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12fd000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 34e2c7722c441e6d39fd1800ac388bedf0edd99fa2a6395384b7138cb1f1736e
                                                  • Instruction ID: 6bd2389e56dacb831053a4530f0d97455b403de34183c7e4436a917b92bf06e3
                                                  • Opcode Fuzzy Hash: 34e2c7722c441e6d39fd1800ac388bedf0edd99fa2a6395384b7138cb1f1736e
                                                  • Instruction Fuzzy Hash: 99212175110208DFDB05DF98C9C0B66FF65FB88324F20C17DEA090B256C33AE406CAA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062607438.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_130d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 38841aa9125a91c8885361437442797800a3ab207165e594f3e536c79940f240
                                                  • Instruction ID: 5834b182cf35e20274c56716b10ae849f8888bcf65b04031660ee60871a532ec
                                                  • Opcode Fuzzy Hash: 38841aa9125a91c8885361437442797800a3ab207165e594f3e536c79940f240
                                                  • Instruction Fuzzy Hash: 6221F571504204EFDB06DFD8D5D0B26BBE9FB84328F20C56DE9094B296C33AD406CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062607438.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_130d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5bd298f7831736aca6a8bab3d14f2af439ecedd9f27494f5f8f2be7ed0c3079
                                                  • Instruction ID: fcd6caca7ab10806d1e78447e07dad03827d5fc1a2f09a4bd6d17325354add33
                                                  • Opcode Fuzzy Hash: a5bd298f7831736aca6a8bab3d14f2af439ecedd9f27494f5f8f2be7ed0c3079
                                                  • Instruction Fuzzy Hash: 81210371604204DFDB16DFA8D990B16BFE9FB84318F20C569D90E4B696C33AD406CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b8465cf6aa1668300514828f2cea86aeb1b1b3a359b87cef51da8907ee5bb95
                                                  • Instruction ID: 38dbd67c5a4608ec077ac2e27caa725fb123ad8c02773687ff63fabd5797258a
                                                  • Opcode Fuzzy Hash: 2b8465cf6aa1668300514828f2cea86aeb1b1b3a359b87cef51da8907ee5bb95
                                                  • Instruction Fuzzy Hash: C721B2B4A10508DFCB08DF9AE084889BFF1FF8C310F5280D4E4489B265EB71D9A5CB01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062540361.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12fd000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                  • Instruction ID: 02c20eb2ed356d2717f8a4314d6a0333073dd269cad2358860e9cba239fc3b51
                                                  • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                  • Instruction Fuzzy Hash: 4D11CD76404284CFDB02CF44D5C4B56BF71FB84224F24C6A9DA090A656C33AE45ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062607438.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_130d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction ID: 323e282c38c75f407ae54dd756975b42929975316e35f185b673654b32afc2e8
                                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction Fuzzy Hash: A211D075504280CFDB12CF54D5D4B15FFA1FB44318F24C6A9D84D4B696C33AD40ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062607438.000000000130D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0130D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_130d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction ID: c4ba207cce25e6039a4f47a83f6de1a2ab56c1e94c0ad9aaadc909c07029c7bf
                                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction Fuzzy Hash: D611BB75504280DFDB02CF98C5D4B15BFB1FB84228F24C6A9D8494B696C33AD40ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062540361.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12fd000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b0974ae2a5f3e4ab5df55b83172c72142db6fb7522d17a9d4e436848b3c8d6cb
                                                  • Instruction ID: 54f1e4b3457d22cc03e618302c93b3c27427871b57bb29d289b77612c6fa72b9
                                                  • Opcode Fuzzy Hash: b0974ae2a5f3e4ab5df55b83172c72142db6fb7522d17a9d4e436848b3c8d6cb
                                                  • Instruction Fuzzy Hash: D5012B710143889AF7259E99CD84B67FF9CEF45320F18C53EEF080E296C2799841CAB1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27fabf0fc292db20bc7b6ff75c13bba5c8a61463abe39aec6ac85a5869236406
                                                  • Instruction ID: 77a2a6b0f9c79186f50db3e39ddceafb02e6a411946f97218f5e892ca63038fd
                                                  • Opcode Fuzzy Hash: 27fabf0fc292db20bc7b6ff75c13bba5c8a61463abe39aec6ac85a5869236406
                                                  • Instruction Fuzzy Hash: AAF03C78D6820CDFDB84DFA8D4412AEBFB8EB48300F4084AA9818A3350E7314A44CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2062540361.00000000012FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_12fd000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a0b55d5d2b16cc952335570533c60bf31433f9e2882121e030435089ed79f810
                                                  • Instruction ID: 4cf36d75aaaf11ddc399541bfcb24c78ff40ea622b8e155e57dbc036b6804e85
                                                  • Opcode Fuzzy Hash: a0b55d5d2b16cc952335570533c60bf31433f9e2882121e030435089ed79f810
                                                  • Instruction Fuzzy Hash: 70F0C2710043849EF7158E1ACC88B62FF98EF41234F18C46EEE080E296C2799840CAB0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 02c1d7a15a7e8dec4c512f9932320d5564573e5d7e35b1e37dfe4cbaa98491c8
                                                  • Instruction ID: ec205ed70bf514abddfc70ef9d6b5a336371b64499c0156a9ebb84c40104ce36
                                                  • Opcode Fuzzy Hash: 02c1d7a15a7e8dec4c512f9932320d5564573e5d7e35b1e37dfe4cbaa98491c8
                                                  • Instruction Fuzzy Hash: B601B278E00208AFCB48DFA9C589A9DBFF1AF48700F05C1A8E9089B365DA31E950DF40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d67d3a884ad1a5654e65d287250224a448739cd6009cd9f37551b7869394b8da
                                                  • Instruction ID: 7e1c09f89dd07f5969e2cd3cebe195be85a02ec0a434a8eb651ffe9979228762
                                                  • Opcode Fuzzy Hash: d67d3a884ad1a5654e65d287250224a448739cd6009cd9f37551b7869394b8da
                                                  • Instruction Fuzzy Hash: 44E0E578E55208EFCB84DFA8D4416ADFBF4EB89314F10C5A9D80893351DA72AA42CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af99ed1080d9008d5f309f2fad41fe382e2d0707f004abfa044b323cf2e2341d
                                                  • Instruction ID: 4d7c7baace482f8f1bd4d4f5dd186f5ad213914997acfb7df82da290315b2a0d
                                                  • Opcode Fuzzy Hash: af99ed1080d9008d5f309f2fad41fe382e2d0707f004abfa044b323cf2e2341d
                                                  • Instruction Fuzzy Hash: C4C0127056530C9BCB54DABC980969B7EB8D745216F424054A808C3100EE7254A0C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 7Z/t$RWIK$[[bb
                                                  • API String ID: 0-1157992699
                                                  • Opcode ID: 6f0611d510c10f6df7ad13b9f040d2a90b7606a429d3e5411c65f690cde4c3d0
                                                  • Instruction ID: 306e10ee2d4345c995197e66d688b1e6c75dd8f32854d3dbf99ef4542cce46a0
                                                  • Opcode Fuzzy Hash: 6f0611d510c10f6df7ad13b9f040d2a90b7606a429d3e5411c65f690cde4c3d0
                                                  • Instruction Fuzzy Hash: 72511770E0561ACFDB48CFAAC4415AFFFF2AF88301F25D46AD815A7254D7349A428F94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0
                                                  • API String ID: 0-4108050209
                                                  • Opcode ID: 27f1f84cdf39f5622daacbf66a0d4616aff8fcfbfcdd63958858f04dd2620166
                                                  • Instruction ID: 44ed5a79b80a3a2c8e87d3f285ad8760be8f46e9aeed7a2749a0fc7dad2367f4
                                                  • Opcode Fuzzy Hash: 27f1f84cdf39f5622daacbf66a0d4616aff8fcfbfcdd63958858f04dd2620166
                                                  • Instruction Fuzzy Hash: 7121F9B1E106188BEB58CFABD84079EFBF3AFC8200F14C07AD518A6214EB300A51CF51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2063064112.0000000002D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D90000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2d90000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d3be42dc509330ceb8608ac0590b51ab73ef6bd6b6d189613cb96998d88d402
                                                  • Instruction ID: 18feabbfa1d176deb06e9c3758ae1f73998083f7bb16e87f416f24a6994d3959
                                                  • Opcode Fuzzy Hash: 5d3be42dc509330ceb8608ac0590b51ab73ef6bd6b6d189613cb96998d88d402
                                                  • Instruction Fuzzy Hash: AFA12636A002098FCF09DFA5C8449AEB7B2FF85304B25856AE805AB765DB31ED55CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ab63252bf0d687a6bcca37200594cc9430fb4563bf5c1df059eddcfda66d0e73
                                                  • Instruction ID: 0d1f2de5f1d1a2ee367dcaf8ef51ecbbcab5083ffe1845260d0ec2d77aa49c27
                                                  • Opcode Fuzzy Hash: ab63252bf0d687a6bcca37200594cc9430fb4563bf5c1df059eddcfda66d0e73
                                                  • Instruction Fuzzy Hash: 8E81BF74E55219CFCB44CFA9C58499EFBF1FF88210F15956AE819AB320D334AA42CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 59ad7b411564630161abd1ff90f30c949c5dae8e670fa8e8086020574fe8d883
                                                  • Instruction ID: 972b2098ee3e69de636d4c769dc10d917e955ec968499b3febcd10edfd017bde
                                                  • Opcode Fuzzy Hash: 59ad7b411564630161abd1ff90f30c949c5dae8e670fa8e8086020574fe8d883
                                                  • Instruction Fuzzy Hash: 44712474E0121A9FDB44CF9AD5809EEFBB2FB88350F11C16AE815AB354D3349A81CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cee7196987b7d5f128d04ab2ca64b2215b11643b1b679c99857616ee865729c2
                                                  • Instruction ID: 0bd26017aaef9c583f4cb0fdc213dffb341d0d1f2552ec32ca8ecd5cc156c163
                                                  • Opcode Fuzzy Hash: cee7196987b7d5f128d04ab2ca64b2215b11643b1b679c99857616ee865729c2
                                                  • Instruction Fuzzy Hash: 96612470995709DFEB48CF94F18619FBFB1FB89300F219489C68597144EF385A64CB48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9b5b9f4c928d66c5f81f99db3e4a87e46f834f5a115bc7f3c20b936b13a0e91
                                                  • Instruction ID: d46dfb611d3f3f60f300995bb415569ac37c00118498aac85ea3eefed0ab52f4
                                                  • Opcode Fuzzy Hash: d9b5b9f4c928d66c5f81f99db3e4a87e46f834f5a115bc7f3c20b936b13a0e91
                                                  • Instruction Fuzzy Hash: 1561F3B0E4420A9FDB44DFAAC5915EEFFB2FF99300F15841AD825A7204D334AA81CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 054f7cd20793c42a53ceb2eba6c2c5043b7b935549e8a013c21e34c35182755a
                                                  • Instruction ID: b7c4c5eccd2189fa262ab2f2f2746238d243fa74e561d64f2126e75ad8e54557
                                                  • Opcode Fuzzy Hash: 054f7cd20793c42a53ceb2eba6c2c5043b7b935549e8a013c21e34c35182755a
                                                  • Instruction Fuzzy Hash: A5513870E5620ACFDB48CFAAD4455AEBFF2FF88310F10942AE405A7294D7745A418F94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 606ca377a1f62c37e910653d2f5a801c6a19097e37eb8714b7d4088005e04167
                                                  • Instruction ID: 9fbaea7a35ddc6f8b6b48ed1edc2384d8a1e8ed67dc418e586db5323330938a0
                                                  • Opcode Fuzzy Hash: 606ca377a1f62c37e910653d2f5a801c6a19097e37eb8714b7d4088005e04167
                                                  • Instruction Fuzzy Hash: 8A4191B2D056588FEB1DCF6B8C5068AFFF3AFC9200F09C1FA8848AB265DA3505558F11
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a2a2c17e4be2be8ec107b1c988034518ab1fd4728f07a121122e9fafd057922
                                                  • Instruction ID: c2e2f2b5128bc0b47eea0692aae76e3cb99e9f9b29ee4bdeda0d8f46843d0a55
                                                  • Opcode Fuzzy Hash: 3a2a2c17e4be2be8ec107b1c988034518ab1fd4728f07a121122e9fafd057922
                                                  • Instruction Fuzzy Hash: BB415071D416188BEB5CCF6B8D4469EFAF3AFC8301F18C1BA881DAA214EB3505958F55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2073654427.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6050000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2ca1bf19e35414623fcd91e9d5e6904f72e04df67b24f690e4d726a26235de1b
                                                  • Instruction ID: 67a4f9a23263ea76354c01b1728c19a2394c8abee94334f65528442ada892c61
                                                  • Opcode Fuzzy Hash: 2ca1bf19e35414623fcd91e9d5e6904f72e04df67b24f690e4d726a26235de1b
                                                  • Instruction Fuzzy Hash: 2241D4B0D4020ADFDB48CFAAC4915EEFFF2BF88200F14D52AD815A7250D774AA418F98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:11.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:24
                                                  Total number of Limit Nodes:4
                                                  execution_graph 26481 1670848 26482 167084e 26481->26482 26483 167091b 26482->26483 26485 1671391 26482->26485 26487 1671396 26485->26487 26486 1671480 26486->26482 26487->26486 26489 1677090 26487->26489 26490 167709a 26489->26490 26492 16770d7 26490->26492 26496 656d398 26490->26496 26501 656d3a8 26490->26501 26491 16770b4 26491->26492 26506 656e33f 26491->26506 26492->26487 26498 656d3a2 26496->26498 26497 656d5d2 26497->26491 26498->26497 26499 656d5f8 GlobalMemoryStatusEx 26498->26499 26500 656d5e8 GlobalMemoryStatusEx 26498->26500 26499->26498 26500->26498 26503 656d3bd 26501->26503 26502 656d5d2 26502->26491 26503->26502 26504 656d5f8 GlobalMemoryStatusEx 26503->26504 26505 656d5e8 GlobalMemoryStatusEx 26503->26505 26504->26503 26505->26503 26507 656e2fb GlobalMemoryStatusEx 26506->26507 26509 656e346 26506->26509 26508 656e30e 26507->26508 26508->26492 26509->26492 26509->26509
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a20ea36795c105d56f82d4f6f20b65f7583661673afcce75db8eea71dff9b062
                                                  • Instruction ID: 3379320521bf46b064c8d9b969b3a9395d51b4450ec3245b58a9799fc105f939
                                                  • Opcode Fuzzy Hash: a20ea36795c105d56f82d4f6f20b65f7583661673afcce75db8eea71dff9b062
                                                  • Instruction Fuzzy Hash: 7563F731D10B1A8ADB51EF68C8406A9F7B1FF99300F15D79AE05877221EB70AAD5CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a7f676d88ee029bc808438b70221642de47e663fd5a11721641a82458d11409
                                                  • Instruction ID: a0efa7aa3553446ad65359f8290de4a7872cfc5a59735af116faff6a91d46974
                                                  • Opcode Fuzzy Hash: 8a7f676d88ee029bc808438b70221642de47e663fd5a11721641a82458d11409
                                                  • Instruction Fuzzy Hash: 1353F731C10B1A8ADB51EF68C8406A9F7B1FF99300F15D79AE45877221EB70AAD5CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40421abb37ecfbfb2a460e7081c0522b6870533ee86b19a09435382fa1d8d8d5
                                                  • Instruction ID: 470340cda787ed9dfd3a92c3c100c0199b399daf20ce5e323b36399c9e347868
                                                  • Opcode Fuzzy Hash: 40421abb37ecfbfb2a460e7081c0522b6870533ee86b19a09435382fa1d8d8d5
                                                  • Instruction Fuzzy Hash: 0AB14C71E00209CFDF10CFA9CD897ADBBF2AF88754F148129D859A7394EB749885CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2603efcf0a6a3f84b464418c4ae89816c700e5342fc433edf75d236f8034784f
                                                  • Instruction ID: c4574c19e9a2b98ae4f6a0afd74df9ee8851a038ee81943499387f5033cd0773
                                                  • Opcode Fuzzy Hash: 2603efcf0a6a3f84b464418c4ae89816c700e5342fc433edf75d236f8034784f
                                                  • Instruction Fuzzy Hash: DF914770E00209DFDB10DFADD9857AEBBF2BF88344F148129E415A7394EB749886CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1315 656e33f-656e344 1316 656e346-656e372 1315->1316 1317 656e2fb-656e30c GlobalMemoryStatusEx 1315->1317 1318 656e374-656e377 1316->1318 1319 656e315-656e33d 1317->1319 1320 656e30e-656e314 1317->1320 1321 656e385-656e388 1318->1321 1322 656e379-656e380 1318->1322 1320->1319 1323 656e38a-656e3a3 call 6561b54 1321->1323 1324 656e3a8-656e3ab 1321->1324 1322->1321 1323->1324 1327 656e3bc-656e3bf 1324->1327 1328 656e3ad-656e3b1 1324->1328 1332 656e3c1-656e3d7 1327->1332 1333 656e3dc-656e3df 1327->1333 1330 656e3b7 1328->1330 1331 656e77b-656e7b6 1328->1331 1330->1327 1361 656e7c8 1331->1361 1362 656e7b8-656e7c6 1331->1362 1332->1333 1334 656e402-656e405 1333->1334 1335 656e3e1-656e3fd 1333->1335 1339 656e407-656e41d 1334->1339 1340 656e422-656e425 1334->1340 1335->1334 1339->1340 1343 656e427-656e46f 1340->1343 1344 656e474-656e477 1340->1344 1343->1344 1348 656e486-656e489 1344->1348 1349 656e479-656e47b 1344->1349 1348->1349 1353 656e48b-656e48e 1348->1353 1349->1331 1352 656e481 1349->1352 1352->1348 1356 656e4b6-656e4b9 1353->1356 1357 656e490-656e4b1 1353->1357 1359 656e4d1-656e4d4 1356->1359 1360 656e4bb-656e4cc 1356->1360 1357->1356 1364 656e4d6-656e502 1359->1364 1365 656e507-656e50a 1359->1365 1360->1359 1366 656e7d0-656e7e5 1361->1366 1362->1366 1364->1365 1369 656e516-656e519 1365->1369 1370 656e50c-656e513 1365->1370 1390 656e7f7 1366->1390 1391 656e7e7-656e7f5 1366->1391 1373 656e52c-656e52f 1369->1373 1374 656e51b-656e525 1369->1374 1375 656e557-656e55a 1373->1375 1376 656e531-656e552 1373->1376 1374->1376 1382 656e527 1374->1382 1379 656e57e-656e581 1375->1379 1380 656e55c-656e579 1375->1380 1376->1375 1386 656e583-656e58a 1379->1386 1387 656e58f-656e592 1379->1387 1380->1379 1382->1373 1386->1387 1388 656e594-656e5a7 1387->1388 1389 656e5ae-656e5b1 1387->1389 1388->1386 1393 656e5a9 1388->1393 1394 656e5b3-656e5c8 1389->1394 1395 656e5cd-656e5d0 1389->1395 1400 656e7ff-656e866 1390->1400 1391->1400 1393->1389 1394->1395 1397 656e5d2-656e5e3 1395->1397 1398 656e5e8-656e5eb 1395->1398 1397->1398 1403 656e5f5-656e5f8 1398->1403 1404 656e5ed-656e5f2 1398->1404 1436 656e86d-656e87a 1400->1436 1407 656e60d-656e610 1403->1407 1408 656e5fa-656e608 1403->1408 1404->1403 1409 656e627-656e62a 1407->1409 1410 656e612-656e622 1407->1410 1408->1407 1414 656e686-656e688 1409->1414 1415 656e62c-656e681 1409->1415 1410->1409 1416 656e68f-656e692 1414->1416 1417 656e68a 1414->1417 1415->1414 1416->1318 1420 656e698-656e6a7 1416->1420 1417->1416 1425 656e763-656e778 1420->1425 1426 656e6ad-656e75d call 6561b54 1420->1426 1425->1331 1426->1425 1441 656e887 1436->1441 1442 656e87c-656e881 1436->1442 1443 656e888 1441->1443 1442->1441 1443->1443
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0656E212), ref: 0656E2FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3314635067.0000000006560000.00000040.00000800.00020000.00000000.sdmp, Offset: 06560000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6560000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID: Te]q
                                                  • API String ID: 1890195054-52440209
                                                  • Opcode ID: 414bf85f87288426a6afc05eedeba005c0afee7405ff68da62e3eb9cfabe057f
                                                  • Instruction ID: 7db215bb7e33d0cf441135a3feb486ee81b829cd7ea6bbe7357c57408cb13786
                                                  • Opcode Fuzzy Hash: 414bf85f87288426a6afc05eedeba005c0afee7405ff68da62e3eb9cfabe057f
                                                  • Instruction Fuzzy Hash: DB51DE35E112198BDF60DFA9C8407ADB7B2FF89311F20852AE409EB354DB74AC46CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2961 656d374-656e30c GlobalMemoryStatusEx 2965 656e315-656e33d 2961->2965 2966 656e30e-656e314 2961->2966 2966->2965
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0656E212), ref: 0656E2FF
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3314635067.0000000006560000.00000040.00000800.00020000.00000000.sdmp, Offset: 06560000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6560000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 9d7adddee6403d18de66afd320d4e699fd87fbb9dc8778b00bb05d5a48ea3fbe
                                                  • Instruction ID: 4fd4797aa75ba4cf27dc054a46077d6ab35521f183dad6dad1e61e698b931c9a
                                                  • Opcode Fuzzy Hash: 9d7adddee6403d18de66afd320d4e699fd87fbb9dc8778b00bb05d5a48ea3fbe
                                                  • Instruction Fuzzy Hash: 51112FB1C046599BCB10DF9AC844AAEFBF4BB08320F14812AE818A7240D378A940CFE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0656E212), ref: 0656E2FF
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3314635067.0000000006560000.00000040.00000800.00020000.00000000.sdmp, Offset: 06560000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6560000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 29c923662e4bafbacfdafeecbc5f7ebc89422bc3ad06e19865c2695f7b73f629
                                                  • Instruction ID: d9301a23893029886849fcbc80b114f196d7070e151e974ce22b7e182cfd62e5
                                                  • Opcode Fuzzy Hash: 29c923662e4bafbacfdafeecbc5f7ebc89422bc3ad06e19865c2695f7b73f629
                                                  • Instruction Fuzzy Hash: 201120B5C006599BCB10CFAAC5457EEFBF4BF08324F14812AE818B7240D378A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH]q
                                                  • API String ID: 0-3168235125
                                                  • Opcode ID: 14c996d1592cd91e247ec4a856e518b768a07f2e88fa8a31cd2619a239852720
                                                  • Instruction ID: 10cdc9b6794a3f9cfd87221133df54f679338d76776e2781633b810f4510686a
                                                  • Opcode Fuzzy Hash: 14c996d1592cd91e247ec4a856e518b768a07f2e88fa8a31cd2619a239852720
                                                  • Instruction Fuzzy Hash: BA31C0307002018FDB159F38C964A6E7BF2AF89250F1444B8D406DB35ADF74DC46CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH]q
                                                  • API String ID: 0-3168235125
                                                  • Opcode ID: 4fba5cc2810292ee60ff0c487ef06d939110dca9c0df6e291a17906ca2292f6a
                                                  • Instruction ID: 8239371aba8cd7fa8342dbd2a653c8a7a24360ae46321106caa19869da5f0972
                                                  • Opcode Fuzzy Hash: 4fba5cc2810292ee60ff0c487ef06d939110dca9c0df6e291a17906ca2292f6a
                                                  • Instruction Fuzzy Hash: DC31ED307002018FDB19AF38C954A6E7BE7AF88250F2444B8D406DB399DF34DD46CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR]q
                                                  • API String ID: 0-3081347316
                                                  • Opcode ID: e5f332aad1801c09fa9326fe8bf93cc212326f6ea3c773aac1ede0f3583e05ac
                                                  • Instruction ID: f109a922777c684040142f9b9c2da3a4a229eb3c3a20a4ef20fab5b402d064cc
                                                  • Opcode Fuzzy Hash: e5f332aad1801c09fa9326fe8bf93cc212326f6ea3c773aac1ede0f3583e05ac
                                                  • Instruction Fuzzy Hash: 7031D474E102099FEF16CF69D84879EB7B2FF85310F10852AE406EB340EB759882CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR]q
                                                  • API String ID: 0-3081347316
                                                  • Opcode ID: 55a79694c8be641090ac390e4c229da4a0ed77a39a85243e4d3c781a60b45a86
                                                  • Instruction ID: f699e78c1a677388d09b640f3848c00fa4637efdf813260d95eb52cad66ae940
                                                  • Opcode Fuzzy Hash: 55a79694c8be641090ac390e4c229da4a0ed77a39a85243e4d3c781a60b45a86
                                                  • Instruction Fuzzy Hash: 2F01D4317041415FDB15AB7C94646AE3BF2EFC6610B1488AEC049CB755DE399C47C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1a9c693db58a2a8e35b72d79cdb99d2fbb17a13f341f308def3bfda65bc1b6f
                                                  • Instruction ID: dadb3ae52f52eb5b52323ec0faf4807a99d40405f022b90b1fbe1665f60f6d27
                                                  • Opcode Fuzzy Hash: c1a9c693db58a2a8e35b72d79cdb99d2fbb17a13f341f308def3bfda65bc1b6f
                                                  • Instruction Fuzzy Hash: 04424A34A002058FDB20DF68C984AADBBF2FF49314F6585A9D429EB366DB35EC41CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 696f86097374482141a9a0598bc49a45f73d4e9dcaadfd98a8a68d40f08690db
                                                  • Instruction ID: 4eaa6cba7bad59c64ab576dbad00164507ddf5fae50444aff8c9afbe481d57a6
                                                  • Opcode Fuzzy Hash: 696f86097374482141a9a0598bc49a45f73d4e9dcaadfd98a8a68d40f08690db
                                                  • Instruction Fuzzy Hash: 0E124C307011069FCB1ABB38E998A2C76A7FB85225F548939E507CB359DF35DC4AC7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4b2551662ecc2dc29481da4dc6c16d9e6a50fc04a35fbc0877d4e5fc6a7fff8e
                                                  • Instruction ID: 9bbfca288e3fa7fe56205b27903d7880592558b2c445b57674df3b98898d1499
                                                  • Opcode Fuzzy Hash: 4b2551662ecc2dc29481da4dc6c16d9e6a50fc04a35fbc0877d4e5fc6a7fff8e
                                                  • Instruction Fuzzy Hash: 23B14A71E00219CFDB10CFA8DD897EDBBF2AF88754F148129D859A7354EB749886CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 39f62d25a1fc16f27c19676ca93459e1569295ad3598b7c29475c1698b78dd75
                                                  • Instruction ID: 917ccedd4d72fd5e1b9bd008235fd02d57a44215b5b4f0f70199f63abb2d5515
                                                  • Opcode Fuzzy Hash: 39f62d25a1fc16f27c19676ca93459e1569295ad3598b7c29475c1698b78dd75
                                                  • Instruction Fuzzy Hash: 67A15C34A001148FDB15DF68D994AADBBF2FF88324F248569E806E73A5DB75EC42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 28ae38ec157e57eaa1783aa40100d2360d9eb6687f751f13b27b0b713a933213
                                                  • Instruction ID: 3edcb05e468326542a56362cec8f554ab091532b752bb1f1cddd71a7a91f6011
                                                  • Opcode Fuzzy Hash: 28ae38ec157e57eaa1783aa40100d2360d9eb6687f751f13b27b0b713a933213
                                                  • Instruction Fuzzy Hash: AC917E70B002169FDB15DF68C880A6EB7A6FF84314F248A69D419DB396DB35EC83C791
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a8f1f0f76cd72efaf2112b030643f7585237b93fb2a569818485e9a27616767f
                                                  • Instruction ID: 89952bf328a25062fca6e9d0ac54abba770a1d06745c098ecf32e3c1ce8abfa6
                                                  • Opcode Fuzzy Hash: a8f1f0f76cd72efaf2112b030643f7585237b93fb2a569818485e9a27616767f
                                                  • Instruction Fuzzy Hash: 95915B34A001158FDB15DF68D984AADBBF2FF88325F248569E806E73A5DB35EC42CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c247cc8336ef3a91a13a7d373fbd9472059aa3f05a9f70f97e762ab5f78ef9f
                                                  • Instruction ID: 5690606f6abb2f22fa66ed3ad518314e898540065d6fbba8501ec0b06aff39e5
                                                  • Opcode Fuzzy Hash: 5c247cc8336ef3a91a13a7d373fbd9472059aa3f05a9f70f97e762ab5f78ef9f
                                                  • Instruction Fuzzy Hash: 4C914870E00209DFDB11DFACD9857AEBBF2BF88354F148129E415A7354EB749886CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3dc36d91fb6acc2f9fff7159fcc565d88aced99c5273e52f588a2ab3264e0c47
                                                  • Instruction ID: 6220d388b1fdcfdefeeb69cb87ac40823aa53d8fb692e1c2420ab48e8943a1a4
                                                  • Opcode Fuzzy Hash: 3dc36d91fb6acc2f9fff7159fcc565d88aced99c5273e52f588a2ab3264e0c47
                                                  • Instruction Fuzzy Hash: C9715B70E00249CFDB14DFADC88579EBBF2BF88314F148129E815A7354EB749842CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b9c7a91a136c80145ed2e0e8c2b370735c10a2159a038fce773f9f50c47d6cd9
                                                  • Instruction ID: 79df13eaab33b504ef8af13e65d802e71dffe20efe1b11a7d8cc2973fa6c954f
                                                  • Opcode Fuzzy Hash: b9c7a91a136c80145ed2e0e8c2b370735c10a2159a038fce773f9f50c47d6cd9
                                                  • Instruction Fuzzy Hash: 8D714AB1D00249DFDB10DFADC9897DEBBF2AF88314F148129E815A7354EB749842CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9553d95ac20da74e65ebba186d510014add5df35fc13a764e0f1b9146042ea72
                                                  • Instruction ID: 7c17b0d05835574b676d10e2451e49de2e680cfe6dda436ee4ab451082aa6202
                                                  • Opcode Fuzzy Hash: 9553d95ac20da74e65ebba186d510014add5df35fc13a764e0f1b9146042ea72
                                                  • Instruction Fuzzy Hash: EA411531A042058BCB16CB78EC946DEBBB5EF85329F10C56EE805EB352DB319947CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2af9be39de8ee92b319c970606d39f6629777052f7ca968c29d4892960af68c
                                                  • Instruction ID: ade123aa65d1fcd005251033b79c0b44820251d5a585c070817441ef8218c139
                                                  • Opcode Fuzzy Hash: e2af9be39de8ee92b319c970606d39f6629777052f7ca968c29d4892960af68c
                                                  • Instruction Fuzzy Hash: 5B415074B0020A8BDF259EACD89177EB7B6EB85324F21482AD51AD7381D734DC46CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cbef247a9a75e4b861d1f885abba9247d14284ac6e2a8e6bda86e755d932b1f
                                                  • Instruction ID: d404a64c7ef1bd8d123d705fcab0aadc52205cc2bc108ce03dfd4649b7e72fbb
                                                  • Opcode Fuzzy Hash: 6cbef247a9a75e4b861d1f885abba9247d14284ac6e2a8e6bda86e755d932b1f
                                                  • Instruction Fuzzy Hash: 6E515875A01205CFDB04DF69E884B99FBB6FF88324F14C16AE9099B396E770D845CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf2f45086650247c47baa88ded826dfcc77f14e17a7ef8f4eeecfd973530eb77
                                                  • Instruction ID: 6fef76d3c5c8b86d09d6b52e3685704d2be317330cfce5c3a495aa81395aed1e
                                                  • Opcode Fuzzy Hash: bf2f45086650247c47baa88ded826dfcc77f14e17a7ef8f4eeecfd973530eb77
                                                  • Instruction Fuzzy Hash: EB512471D106188FEB18CFA9C884B9DFBB1BF48314F148529E819BB391D774A845CFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05c8a89ef694a5b04454a7aaf90f0a32def50f3e29e965ae917a391eeda6eaae
                                                  • Instruction ID: 300766176f6e5fc4f52ae772de24063be182116e0bade27fff15954dbb125d37
                                                  • Opcode Fuzzy Hash: 05c8a89ef694a5b04454a7aaf90f0a32def50f3e29e965ae917a391eeda6eaae
                                                  • Instruction Fuzzy Hash: D651DA3160324A9FCB2AFF38FDA8A483F67FB553043005979D1059B63DDB24692ADB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b4254367cb55832f988cf0ced3dd07c0450282251729c5581d781b072ece0cdb
                                                  • Instruction ID: 836a470af70ce83fc25826db2082561d823675124476f6ed3c6685af6547f977
                                                  • Opcode Fuzzy Hash: b4254367cb55832f988cf0ced3dd07c0450282251729c5581d781b072ece0cdb
                                                  • Instruction Fuzzy Hash: 80316175B002068BDB25DE78D98177EB7B6EB85324F214829C51AE7385D734EC428B82
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc31d8489c01565fe69f7b99e6e7262c465bf04a1d04712a24a83ba2c3fc93f5
                                                  • Instruction ID: 769793c3ecfba8d96df5db5dd5a673a0eec0103e7e980f8aca47ca75868679fb
                                                  • Opcode Fuzzy Hash: fc31d8489c01565fe69f7b99e6e7262c465bf04a1d04712a24a83ba2c3fc93f5
                                                  • Instruction Fuzzy Hash: 5141E1B0D00348DFDB14DFA9C994ADEBFB5FF48314F148029E419AB254DB75994ACB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 128e90fc11a000783a7c3d738ff3ffec5316647f969b7fcc989c22cd71ca7c34
                                                  • Instruction ID: 2b74c69732addc8393d0e2d3a13e6bbedadca9e62546f60a45d547922f4d7edd
                                                  • Opcode Fuzzy Hash: 128e90fc11a000783a7c3d738ff3ffec5316647f969b7fcc989c22cd71ca7c34
                                                  • Instruction Fuzzy Hash: AF316E307012198FDB19EB78D9656AD77B6AF49206F2004BDC406AB7A4DF36CC46CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a9ade7e88d5edd156c6a03906c465e4098fd4ffd62b73dbfb42263214bf2d1fb
                                                  • Instruction ID: 4681604c39129eec5b9c542a988af816b4bd2e396e36a2b12e72fe48ec6aa6c4
                                                  • Opcode Fuzzy Hash: a9ade7e88d5edd156c6a03906c465e4098fd4ffd62b73dbfb42263214bf2d1fb
                                                  • Instruction Fuzzy Hash: BE316030E10205DBCF15DF68D894A9EBBB2FF89310F108969E816E7754DB71AC46CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df9aa436b6263db52bdbd1f59f45cfee3eaf6a1db0897aaf26ef32eafd47ff6f
                                                  • Instruction ID: b79c1775880b7c3dbe8b59ad53e3d7f5e38debd1053f9ad5316657587d3eb405
                                                  • Opcode Fuzzy Hash: df9aa436b6263db52bdbd1f59f45cfee3eaf6a1db0897aaf26ef32eafd47ff6f
                                                  • Instruction Fuzzy Hash: 3B41EEB0D003489FDB14DFA9C994ADEBFB5FF48310F148029E419AB254DB75A949CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 19b3dacd24f5d9b39d402b37b0a6af0fc862a2460cdf441b6e407c5cafa46e27
                                                  • Instruction ID: 7caad5cb93cef907d9fa35bf817416abdda6b6cf56779a0da826f7885bdfa5c6
                                                  • Opcode Fuzzy Hash: 19b3dacd24f5d9b39d402b37b0a6af0fc862a2460cdf441b6e407c5cafa46e27
                                                  • Instruction Fuzzy Hash: 7C316C307012198FDB15EB78D9656AD77F6AF89206F2004BDC406AB3A4DF36DC06CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d14c2ff225aa6bf2ae2f432eb8eb90f36eb49fc2748236bb58b1cd91da3be646
                                                  • Instruction ID: 3d4f9d982fb7b1be34a5ab815fa81bcdfed8aa7c53b78279475288456e9273ba
                                                  • Opcode Fuzzy Hash: d14c2ff225aa6bf2ae2f432eb8eb90f36eb49fc2748236bb58b1cd91da3be646
                                                  • Instruction Fuzzy Hash: 90318530E002099BDB05DFA8D89479EFBB2FF85324F10C629E815EB355D7719846CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 88b2c9e17b189ae4f2d53e18f3322bfa7845a2ad3e7685225521e23809aeccca
                                                  • Instruction ID: 6c14c747d814221650cfb4ace0c94ff95db4b209b3925064000d01fb08790655
                                                  • Opcode Fuzzy Hash: 88b2c9e17b189ae4f2d53e18f3322bfa7845a2ad3e7685225521e23809aeccca
                                                  • Instruction Fuzzy Hash: 25218230E0020A9BDB05DFA8D894A9EFBB2FF85324F10C629E815EB355DB719846CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ac0c75a72d635e7f52ef31f3f155e081e2291b83e61bc9cd4b80f40f072c69fa
                                                  • Instruction ID: 06facd591f917fca6305ac6dcc7f7c7574051cd8d0336838d372df001525a882
                                                  • Opcode Fuzzy Hash: ac0c75a72d635e7f52ef31f3f155e081e2291b83e61bc9cd4b80f40f072c69fa
                                                  • Instruction Fuzzy Hash: BB216D31B102058FDB14ABADCD54BAE7BF6AF88728F108169E505EB3A5DBB1DD408B50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa0dcaf3533d2d88df67fd6cc5bf8454e399c68ee3af594b00326f58b91ceb9a
                                                  • Instruction ID: afbd714c6c084dddc384b673dbf35f7172411f8b62f79a990aa393e09ae2a96a
                                                  • Opcode Fuzzy Hash: fa0dcaf3533d2d88df67fd6cc5bf8454e399c68ee3af594b00326f58b91ceb9a
                                                  • Instruction Fuzzy Hash: E2219071E102098BCB19DF68D8946DEF7F2AF89314F10C51AEC16BB341DB709946CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcd49890a402b15e0ca36aa4c5ab5ff77369fbb839af15d252ec50187323c92b
                                                  • Instruction ID: cca2300c5835520d6607d3da9e15e92f8cb92edacec2f54ba7fe30e7659f9745
                                                  • Opcode Fuzzy Hash: fcd49890a402b15e0ca36aa4c5ab5ff77369fbb839af15d252ec50187323c92b
                                                  • Instruction Fuzzy Hash: E8212E34700245CFCB55DB78D959AADBBF2EF89304B1044A9E406EB365DB369D05CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308533429.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_162d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7268a3e5ba88f93557140a720dfc76f4fd33425a39c6b13321aca8203ca46dd9
                                                  • Instruction ID: e6ad268c01de16379866db857c792000dde611d306fad9edd38f4aa0fc3b2480
                                                  • Opcode Fuzzy Hash: 7268a3e5ba88f93557140a720dfc76f4fd33425a39c6b13321aca8203ca46dd9
                                                  • Instruction Fuzzy Hash: 39210071504604DFCB15DF98D980B26BBA5FB88314F20C569D90A4A3A6C33AD807CA62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a745d9062e5aec68056f7c32fb62b4c81b6442b2eb41717484abf64919c576f8
                                                  • Instruction ID: f4d03f24151d4c4f2f8351514abe537d0870af86e96b19973c12317e82c2be6b
                                                  • Opcode Fuzzy Hash: a745d9062e5aec68056f7c32fb62b4c81b6442b2eb41717484abf64919c576f8
                                                  • Instruction Fuzzy Hash: 9D218430E1020A9BCB19DF68D85459EF7F2AF89314F10C51AEC15FB351DB70A946CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0a65e67c6b3a4bf6eec6a3c7b89bbc3c83ea82f88fd397e6e480a484b6625e75
                                                  • Instruction ID: e81585bd502a84a02913ba41bdd7e923556366d28ae5b84316819780f98c62cf
                                                  • Opcode Fuzzy Hash: 0a65e67c6b3a4bf6eec6a3c7b89bbc3c83ea82f88fd397e6e480a484b6625e75
                                                  • Instruction Fuzzy Hash: 0F213030B00209CFDB15EB78C9156AE77F6AF4A205F10046ED506EB364DF368D46CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b41de7c4acac0b8d75246301da0609709bb17ca5df144f101110221207c135
                                                  • Instruction ID: 381c5f499b00e6fe27abea07c6dd19713cff07ebe36326d050c192227642f9ac
                                                  • Opcode Fuzzy Hash: 27b41de7c4acac0b8d75246301da0609709bb17ca5df144f101110221207c135
                                                  • Instruction Fuzzy Hash: 08218E71B101058FEB14DB69CD55BAE7BF6AF88724F148069E505EB3A4DB71DD00CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 59ba4be005ff62a2e09bbc0171791613617bdb0eb9a5c89b196b4f1a1c30dc1d
                                                  • Instruction ID: 60c916745cb69e194d019c2e9dd9550473d07fb8d91421067cc3bb53761b5ac0
                                                  • Opcode Fuzzy Hash: 59ba4be005ff62a2e09bbc0171791613617bdb0eb9a5c89b196b4f1a1c30dc1d
                                                  • Instruction Fuzzy Hash: F9218E386401068BDF26EB38EC98B2D776AEB45314F104A37D10AC735ADB28D855CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef8948f48f91730e9ccf941d4dfe4fcaa874a18054595fbfceae55140bc65d41
                                                  • Instruction ID: 1007855ad68b4eaa7258efe5e6f58daaccb1e1ad51f565a5bf874e6ed6e74e7a
                                                  • Opcode Fuzzy Hash: ef8948f48f91730e9ccf941d4dfe4fcaa874a18054595fbfceae55140bc65d41
                                                  • Instruction Fuzzy Hash: 10210C34700209CFDB15DB78D959A9DB7F2EF89304F1044A9E406EB364DB369D05CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3b562d54e8aa8aa53d6f60a89e7bce7f34036f19a100bc7fec891348b4f86a6
                                                  • Instruction ID: 82816cd294a92d9d719a934d6ebf7e6812d4d21ce1755d1f4e4dcf15214ace96
                                                  • Opcode Fuzzy Hash: e3b562d54e8aa8aa53d6f60a89e7bce7f34036f19a100bc7fec891348b4f86a6
                                                  • Instruction Fuzzy Hash: D9118230A422018BEF36673DE85832D3666EB47325F50086FE51AC739ADB29C9D5C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7a0bbedcb12d38da4cf03c3c45f45f7a15b589f43925b94b248364d63b956b1b
                                                  • Instruction ID: 14423ce38b8520ed5ca19e16b30066493b43d8467a60acb14c5351c45c5a063b
                                                  • Opcode Fuzzy Hash: 7a0bbedcb12d38da4cf03c3c45f45f7a15b589f43925b94b248364d63b956b1b
                                                  • Instruction Fuzzy Hash: 7911C430B002048FDF65AA7DDC1476E369AEB46220F214A7AF006CF396DB24D8858BE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308533429.000000000162D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0162D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_162d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction ID: c4848c327c5b2e1f531ba6385cb8c366d0568bfd983758618a90776ca0ab4063
                                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction Fuzzy Hash: D111BB75504680CFDB12CF58D9C4B15BFA1FB88314F28C6AAD9494B766C33AD44ACF62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 889097b7ab982578a0066e1d537a90ae29f4e340c8c1f5607cff2dc9db68d30d
                                                  • Instruction ID: 0e1b471f03412f6296a1b4ec5f524ca356d7e67b417a461ed0c82d0790c1b7b8
                                                  • Opcode Fuzzy Hash: 889097b7ab982578a0066e1d537a90ae29f4e340c8c1f5607cff2dc9db68d30d
                                                  • Instruction Fuzzy Hash: 11015671A013159FDF65EFBC8C5019DBBF6EF4A210B14047AE805E7341E739D9428BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fcfe80edf25341f5eb35f2ea586f591be3586843a60f6a5f5d5e76a1fb91b033
                                                  • Instruction ID: 190b6105e25ebf4f7270c632e44a12fb866d2659f1dc4afa2f10a02a7d223a8e
                                                  • Opcode Fuzzy Hash: fcfe80edf25341f5eb35f2ea586f591be3586843a60f6a5f5d5e76a1fb91b033
                                                  • Instruction Fuzzy Hash: E301F975F40215DFDF10AB799C0826E7BE6EB88650F10483BD91AD3341EB34C9528BC1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cb417a32000fb6411f7e39cf9c3b71a4c3518dc882cb68f7bfbb9b180618d0f8
                                                  • Instruction ID: ad8e617c0ae5b49c18c020430c855e8ef5dc5231489c0c1af27adf60af1f4b1f
                                                  • Opcode Fuzzy Hash: cb417a32000fb6411f7e39cf9c3b71a4c3518dc882cb68f7bfbb9b180618d0f8
                                                  • Instruction Fuzzy Hash: 4E018031A001058BDB04EFA9EA8578ABBA6FF84321F58C664C8085B39AD774D906C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 088e729648e82cb7802e9481f65dab799ca5c7f907025cd0379693369b1139b2
                                                  • Instruction ID: b9f4fa93651da53f66612bcc5f0709ccfca19a600b722d38b9c726f42768b327
                                                  • Opcode Fuzzy Hash: 088e729648e82cb7802e9481f65dab799ca5c7f907025cd0379693369b1139b2
                                                  • Instruction Fuzzy Hash: D7014B34B40108CFDB14DB74E99CB6C77B2EF88315F5444A9E50A8B3A1DB35AC52CB40
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9a02ad19845e1f3c2e15465be2fcca0fbec9bd5c97f3d8720adb4f47992c3516
                                                  • Instruction ID: 772c4d34914a6b0975b36b3b1121e7d1dbcfcb3366437d3c1713507211541d58
                                                  • Opcode Fuzzy Hash: 9a02ad19845e1f3c2e15465be2fcca0fbec9bd5c97f3d8720adb4f47992c3516
                                                  • Instruction Fuzzy Hash: 8D01A23054114A9FCB06FB74FA54A8D7FB6EF41314B1047A9C4059F2A9DF32AB0AC792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a11145e9e306c228a699e702020eab02026d801163c6f4750bdcba5fe639c256
                                                  • Instruction ID: 17dbbd4c6f4d7b3b67fea72444a099437d9af61a7ed61f5e1d6cd4f1ef913392
                                                  • Opcode Fuzzy Hash: a11145e9e306c228a699e702020eab02026d801163c6f4750bdcba5fe639c256
                                                  • Instruction Fuzzy Hash: E8F0F072A042509BEB228BA88C901ACBFA1EEAA12171C00EBD802DB351D729D542CB21
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3308782893.0000000001670000.00000040.00000800.00020000.00000000.sdmp, Offset: 01670000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_1670000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f74858c481aabd746d29e98cab541c4f5684670c2b9c1549441b59ec566a0ab4
                                                  • Instruction ID: efb753c053a3dfe5c1bfb9a4b7f595dc02689babdbea14ae12859c1ce66bf5e5
                                                  • Opcode Fuzzy Hash: f74858c481aabd746d29e98cab541c4f5684670c2b9c1549441b59ec566a0ab4
                                                  • Instruction Fuzzy Hash: 96F01D3490110E9FCB05FFB4FA54A9D7BBAEF40304F5046B9C1059B258DB316B19CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%