Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
Analysis ID:1431495
MD5:0213307d4a5c33c73fc8763498a054e5
SHA1:2c6978c737ad7b1a9547ed3365fef15996d98137
SHA256:6266398586cea7e8cc4154202bb9f5541b1a6b6b5640f0efdd2f2ef9e82c7ae6
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.albushrametalic.com", "Username": "mustafa@albushrametalic.com", "Password": "GLBL1285#"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1699372281.0000000004F90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1697066851.00000000039E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      Click to see the 8 entries

                      System Summary

                      barindex
                      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.218.140, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, Initiated: true, ProcessId: 7588, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.albushrametalic.com", "Username": "mustafa@albushrametalic.com", "Password": "GLBL1285#"}
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeReversingLabs: Detection: 21%
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeVirustotal: Detection: 35%Perma Link
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeJoe Sandbox ML: detected
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49733 version: TLS 1.2
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DECE7
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEBDB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEA9A
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DECBC
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEC9D
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEF1B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEB3B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEB09
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEB90
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 4x nop then jmp 053DF541h0_2_053DEAC6
                      Source: global trafficTCP traffic: 192.168.2.4:49736 -> 50.87.218.140:587
                      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                      Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: unknownDNS query: name: api.ipify.org
                      Source: global trafficTCP traffic: 192.168.2.4:49736 -> 50.87.218.140:587
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                      Source: global trafficDNS traffic detected: DNS query: mail.albushrametalic.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.albushrametalic.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49733 version: TLS 1.2

                      System Summary

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_00A9E3B40_2_00A9E3B4
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_027C07790_2_027C0779
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DA6680_2_053DA668
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D21170_2_053D2117
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D21500_2_053D2150
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D21410_2_053D2141
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DA2300_2_053DA230
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DC2A00_2_053DC2A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DC2900_2_053DC290
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DCC500_2_053DCC50
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D38100_2_053D3810
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D38000_2_053D3800
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D08B00_2_053D08B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D089F0_2_053D089F
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DAAA00_2_053DAAA0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DAA900_2_053DAA90
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E2A9682_2_00E2A968
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E24A982_2_00E24A98
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E2DBE02_2_00E2DBE0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E23E802_2_00E23E80
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E241C82_2_00E241C8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_0661E4F92_2_0661E4F9
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_06615D682_2_06615D68
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066145E02_2_066145E0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066135982_2_06613598
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066192182_2_06619218
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066110582_2_06611058
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_0661A1802_2_0661A180
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066156882_2_06615688
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_06613CDB2_2_06613CDB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_066103282_2_06610328
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_0661C3A02_2_0661C3A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_0676A0682_2_0676A068
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.00000000043D7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1696042995.0000000002A41000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6e05af16-ebc6-4b97-8d30-78ae493d4992.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1702722006.00000000099A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1695067425.0000000000CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename6e05af16-ebc6-4b97-8d30-78ae493d4992.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename6e05af16-ebc6-4b97-8d30-78ae493d4992.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878440651.0000000000AF9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeBinary or memory string: OriginalFilenamelgL.exe" vs SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, V4uC3Iifq56IKQcfry.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, qYt43Hw1x654cfr8dB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.SetAccessControl
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, P1VTvV0hsXjgi8LbY8.csSecurity API names: _0020.AddAccessRule
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, qYt43Hw1x654cfr8dB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, qYt43Hw1x654cfr8dB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.2c464c0.0.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.2a31e4c.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.2a421ec.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.2c35e60.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMutant created: NULL
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMutant created: \Sessions\1\BaseNamedObjects\UevDKObWJiIT
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeReversingLabs: Detection: 21%
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeVirustotal: Detection: 35%
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                      Data Obfuscation

                      barindex
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, V4uC3Iifq56IKQcfry.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, SpreadsheetName.cs.Net Code: InitializeComponent System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, P1VTvV0hsXjgi8LbY8.cs.Net Code: cEuQDIn8i9 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, P1VTvV0hsXjgi8LbY8.cs.Net Code: cEuQDIn8i9 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, P1VTvV0hsXjgi8LbY8.cs.Net Code: cEuQDIn8i9 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_027C0578 pushfd ; iretd 0_2_027C0581
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_027C052A push eax; iretd 0_2_027C0531
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_04DC8E78 push eax; mov dword ptr [esp], ecx0_2_04DC8E7C
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_04DC8E69 push eax; mov dword ptr [esp], ecx0_2_04DC8E7C
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_04DC9951 push eax; ret 0_2_04DC9983
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DD311 pushad ; retf 0_2_053DD315
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053D62A7 push ebx; iretd 0_2_053D62AA
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DB932 pushad ; retf 0_2_053DB991
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 0_2_053DE941 push esp; ret 0_2_053DE949
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E20B4F push edi; ret 2_2_00E20CC2
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_00E27CDD push edx; ret 2_2_00E27CDE
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_06765150 push es; ret 2_2_06765160
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeCode function: 2_2_0676FCC7 push es; retf 2_2_0676FCC8
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeStatic PE information: section name: .text entropy: 7.969312774312396
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, M2ootgS1CfuBsWFleq.csHigh entropy of concatenated method names: 'vZArptG6dd', 'KNbr0vUSq2', 'CmLrabUQpy', 'Oinr7PDnsX', 'DenrZseSs1', 'UJkafPiX5p', 'MXSaO0BEXs', 'KZBabedClb', 'XuVaFdZh7t', 'naRajZtyeE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, yBOc7lgHd6VrnlsTNx.csHigh entropy of concatenated method names: 'UPqdoU8QPl', 'DPSd8wVPIc', 'ToString', 'pMxdmcorhr', 'SNhd0fDIJD', 'PvNdhPrMOe', 'K5MdaSTlC1', 'EsIdr5I3NC', 'dkyd717yPa', 'm1DdZGOa5H'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, hraxQMhxnO8RmGZUUe.csHigh entropy of concatenated method names: 'Sb5Rew0NUm', 'kQiRv5pjio', 'mYlRwh6UCk', 'AFkRPgWbkF', 'rJFRl6TlL4', 'w80R3lsj6Z', 'V6hR4AStjU', 'QnrRUGM0Oh', 'oHxRBlGy5t', 'rGlR5UexwE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, HBFKX1JVt9TEuOClus.csHigh entropy of concatenated method names: 'qnxDkx8Cp', 'pkrCGYPPw', 'a4eHqLIX7', 'GxLIMqn53', 'gy69MSsVx', 'eDGq7VxDc', 'ymuCutqRKZpRg7vuUR', 'n1qQnFAc9DEhvLpHQ8', 'MriEx2xJp', 'di8XfN7y4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, OeU3cI8sp3OjCJn3Kf.csHigh entropy of concatenated method names: 'ToString', 'XxosSaUOgR', 'pCOslyfI6Y', 'Qcns3dZRg9', 'kRts4HyJNJ', 'FLYsUX4dKU', 'VmmsBUL8FS', 'diHs5TrmMV', 'cABskkZWna', 'Ortsy7lMLd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, fDvwuDXcNnoxRn0R7w.csHigh entropy of concatenated method names: 'uFAnYrwVVs', 'trCnghZubq', 'bfknQWvbHe', 'h74nm31d24', 'xPwn0YoNRP', 'hETna4A6Yb', 'RxVnrqOYkg', 'HOaEbLb1d2', 'yNOEFixNkv', 'sTCEjvUgyI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, uKNc5B3YlmhyRNdOetd.csHigh entropy of concatenated method names: 'fEBnAgJfTC', 'uHLnJbh8su', 'nfSnDVPMg9', 'xV8nCViDF1', 'EK2nMJAUpl', 'X0OnHLAJEt', 'Gp6nIFiTUV', 'zthnLmOiAL', 'GG2n9KZpKZ', 'naRnqIjx5w'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, P1VTvV0hsXjgi8LbY8.csHigh entropy of concatenated method names: 's9CgpR0WBt', 'zJdgmIPEaH', 'B08g0k4mMR', 'uW0ghX2J4M', 'ssggaex8Pq', 'hykgri8Thx', 'A2Ig7bw9K5', 'OcPgZo4opm', 'Ad8gGlD7YP', 'NoMgotyLBg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, o5bTuy6gKTgq9DpGpW.csHigh entropy of concatenated method names: 'J1w7mlkaEU', 'e7K7hql4A8', 'Wae7rekZx4', 'yX7rVuOA9j', 'rBarzXvjS2', 's7T71RenW7', 'vp37Y7T7Pu', 'ro17Nhgtmv', 'pNb7gn2s8x', 'IFD7QcNfs3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, uZfeGhWjtboPaKuqIs.csHigh entropy of concatenated method names: 'Dispose', 'xhVYjodVmv', 'YfnNlA2sJ0', 'VkuccqBVbJ', 'YImYV0uFFT', 'tj6YzjIWxR', 'ProcessDialogKey', 'gduN1kBhqD', 'ernNYSiimi', 'qTxNNx3hJO'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, zOvuh6z4XEuwhwvtHd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gfHntRbjO6', 'NKvnRHBw95', 'IydnsaCObt', 'FLJndmYeZo', 'oC2nE9PiTU', 'AjWnna6lx3', 'dlJnX3futx'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, ylPS4VFN0pw8cwdurc.csHigh entropy of concatenated method names: 'D0MEmtKTnV', 'je6E01deJT', 'RpUEhs0rBs', 'xNcEa5gW0H', 'aEyErGxqmU', 'R1sE7LSJ4a', 'EcDEZVZUKY', 'Q3rEGomUjG', 'dZnEo45mba', 'dl1E84eh5C'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, qYt43Hw1x654cfr8dB.csHigh entropy of concatenated method names: 'wiY0wkx6QM', 'ckS0PJvcRP', 'RnI0xLyljp', 'ooT0uSARtS', 'b1Y0f59b9d', 'gdx0O7P9EB', 'dHE0bGphU1', 'UWU0FhcTtb', 'Wmw0jBHOH0', 'WNj0V62qpg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, uWJfX3ONd7Hxnbpa08.csHigh entropy of concatenated method names: 'ByZE2LnrHO', 'lV9Elyw5Th', 'vptE3iOWvQ', 'R6iE40YhNN', 'X0kEw12wRj', 'PrkEU3mnjh', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, NirxcLpgnhABtVmpoV.csHigh entropy of concatenated method names: 'JG1aMNY1Dn', 'g98aI7syAS', 'DEVh3BfQH9', 'j2jh4jcGdP', 'D2lhU3CBpE', 'F9MhBUYMrE', 'Fpgh5HLRRq', 'lMFhktyeK8', 'h9PhyDcHqV', 'HKNheTKgfm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, py9F9qQUTg99JaHyW8.csHigh entropy of concatenated method names: 'OpShCsmcqh', 'PFVhHD3E3j', 'c3ThLOWPvP', 'Ldlh9Y9l41', 'F3RhRwBh6a', 'jtphsjuhNY', 'XVZhdnSWL9', 'GYkhE8PQdj', 'SUOhnKtPy8', 'noXhXWkur6'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, KxecM573EOlWiRyX2L.csHigh entropy of concatenated method names: 'OcodFyRrm2', 'QwfdV3ElvY', 'CNxE1WpK7P', 'biaEYQ2lXP', 'xCXdS1c2Ew', 'xb7dv9sJNU', 'KUxdTnSOXI', 'on7dwlRtea', 'X3NdPC7LKK', 'ONydxq6VGF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, luO9kIbSScgVlQaNVi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bxKNj3yGIp', 'aC4NV54DPr', 'qgTNzcZbug', 'dj5g1vqKZN', 'QoHgYtbshE', 'NvbgN3xrtk', 'kDWggOWQjM', 'ga7DULtvuABvf23Owly'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, QjoCtKKvdeTml6x2c4.csHigh entropy of concatenated method names: 'f0P7AIItXC', 'KKF7JPCOiK', 'N7L7Dr8K6p', 'Aqt7COiH1a', 'QuT7MjKH41', 'Q2x7HgCRcK', 'd087IIHSiX', 'B0R7LI1NZq', 'v4Z794Lhv0', 'T407qCQjla'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, WGiqJwVKmhfFXVpbWq.csHigh entropy of concatenated method names: 'eEDtLdnNms', 'zWnt9mPbcX', 'NfOt2iWEr8', 'PHXtlSNDsF', 'gZ3t4xnc2k', 'n0KtUuvLc5', 'sodt5MN3Hv', 'FWWtkywIqI', 'u3EteDdJHf', 'mS2tSoZMA0'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, jFJ6fd3ddQMLadc52Wm.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'b0wXw08Flu', 'uDDXPbsnSn', 'KU1XxgugVy', 'RLAXuKsoLo', 'A2gXfl86Gd', 'KCOXOfKXIS', 'FERXbT9Nnj'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.99a0000.10.raw.unpack, Reein8PgQXHy0KycGx.csHigh entropy of concatenated method names: 'x84Y7YgilO', 'nrrYZHLscX', 'SOQYoF8sl7', 'CifY8Z919L', 'VO8YRhmhxZ', 'BSlYsK6a9w', 'ctqly4Ne3x16cHsGgn', 'GCqYphc6T2GbsTBGa2', 'Se2YY1BNP2', 'nEpYgsCndi'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, M2ootgS1CfuBsWFleq.csHigh entropy of concatenated method names: 'vZArptG6dd', 'KNbr0vUSq2', 'CmLrabUQpy', 'Oinr7PDnsX', 'DenrZseSs1', 'UJkafPiX5p', 'MXSaO0BEXs', 'KZBabedClb', 'XuVaFdZh7t', 'naRajZtyeE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, yBOc7lgHd6VrnlsTNx.csHigh entropy of concatenated method names: 'UPqdoU8QPl', 'DPSd8wVPIc', 'ToString', 'pMxdmcorhr', 'SNhd0fDIJD', 'PvNdhPrMOe', 'K5MdaSTlC1', 'EsIdr5I3NC', 'dkyd717yPa', 'm1DdZGOa5H'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, hraxQMhxnO8RmGZUUe.csHigh entropy of concatenated method names: 'Sb5Rew0NUm', 'kQiRv5pjio', 'mYlRwh6UCk', 'AFkRPgWbkF', 'rJFRl6TlL4', 'w80R3lsj6Z', 'V6hR4AStjU', 'QnrRUGM0Oh', 'oHxRBlGy5t', 'rGlR5UexwE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, HBFKX1JVt9TEuOClus.csHigh entropy of concatenated method names: 'qnxDkx8Cp', 'pkrCGYPPw', 'a4eHqLIX7', 'GxLIMqn53', 'gy69MSsVx', 'eDGq7VxDc', 'ymuCutqRKZpRg7vuUR', 'n1qQnFAc9DEhvLpHQ8', 'MriEx2xJp', 'di8XfN7y4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, OeU3cI8sp3OjCJn3Kf.csHigh entropy of concatenated method names: 'ToString', 'XxosSaUOgR', 'pCOslyfI6Y', 'Qcns3dZRg9', 'kRts4HyJNJ', 'FLYsUX4dKU', 'VmmsBUL8FS', 'diHs5TrmMV', 'cABskkZWna', 'Ortsy7lMLd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, fDvwuDXcNnoxRn0R7w.csHigh entropy of concatenated method names: 'uFAnYrwVVs', 'trCnghZubq', 'bfknQWvbHe', 'h74nm31d24', 'xPwn0YoNRP', 'hETna4A6Yb', 'RxVnrqOYkg', 'HOaEbLb1d2', 'yNOEFixNkv', 'sTCEjvUgyI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, uKNc5B3YlmhyRNdOetd.csHigh entropy of concatenated method names: 'fEBnAgJfTC', 'uHLnJbh8su', 'nfSnDVPMg9', 'xV8nCViDF1', 'EK2nMJAUpl', 'X0OnHLAJEt', 'Gp6nIFiTUV', 'zthnLmOiAL', 'GG2n9KZpKZ', 'naRnqIjx5w'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, P1VTvV0hsXjgi8LbY8.csHigh entropy of concatenated method names: 's9CgpR0WBt', 'zJdgmIPEaH', 'B08g0k4mMR', 'uW0ghX2J4M', 'ssggaex8Pq', 'hykgri8Thx', 'A2Ig7bw9K5', 'OcPgZo4opm', 'Ad8gGlD7YP', 'NoMgotyLBg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, o5bTuy6gKTgq9DpGpW.csHigh entropy of concatenated method names: 'J1w7mlkaEU', 'e7K7hql4A8', 'Wae7rekZx4', 'yX7rVuOA9j', 'rBarzXvjS2', 's7T71RenW7', 'vp37Y7T7Pu', 'ro17Nhgtmv', 'pNb7gn2s8x', 'IFD7QcNfs3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, uZfeGhWjtboPaKuqIs.csHigh entropy of concatenated method names: 'Dispose', 'xhVYjodVmv', 'YfnNlA2sJ0', 'VkuccqBVbJ', 'YImYV0uFFT', 'tj6YzjIWxR', 'ProcessDialogKey', 'gduN1kBhqD', 'ernNYSiimi', 'qTxNNx3hJO'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, zOvuh6z4XEuwhwvtHd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gfHntRbjO6', 'NKvnRHBw95', 'IydnsaCObt', 'FLJndmYeZo', 'oC2nE9PiTU', 'AjWnna6lx3', 'dlJnX3futx'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, ylPS4VFN0pw8cwdurc.csHigh entropy of concatenated method names: 'D0MEmtKTnV', 'je6E01deJT', 'RpUEhs0rBs', 'xNcEa5gW0H', 'aEyErGxqmU', 'R1sE7LSJ4a', 'EcDEZVZUKY', 'Q3rEGomUjG', 'dZnEo45mba', 'dl1E84eh5C'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, qYt43Hw1x654cfr8dB.csHigh entropy of concatenated method names: 'wiY0wkx6QM', 'ckS0PJvcRP', 'RnI0xLyljp', 'ooT0uSARtS', 'b1Y0f59b9d', 'gdx0O7P9EB', 'dHE0bGphU1', 'UWU0FhcTtb', 'Wmw0jBHOH0', 'WNj0V62qpg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, uWJfX3ONd7Hxnbpa08.csHigh entropy of concatenated method names: 'ByZE2LnrHO', 'lV9Elyw5Th', 'vptE3iOWvQ', 'R6iE40YhNN', 'X0kEw12wRj', 'PrkEU3mnjh', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, NirxcLpgnhABtVmpoV.csHigh entropy of concatenated method names: 'JG1aMNY1Dn', 'g98aI7syAS', 'DEVh3BfQH9', 'j2jh4jcGdP', 'D2lhU3CBpE', 'F9MhBUYMrE', 'Fpgh5HLRRq', 'lMFhktyeK8', 'h9PhyDcHqV', 'HKNheTKgfm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, py9F9qQUTg99JaHyW8.csHigh entropy of concatenated method names: 'OpShCsmcqh', 'PFVhHD3E3j', 'c3ThLOWPvP', 'Ldlh9Y9l41', 'F3RhRwBh6a', 'jtphsjuhNY', 'XVZhdnSWL9', 'GYkhE8PQdj', 'SUOhnKtPy8', 'noXhXWkur6'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, KxecM573EOlWiRyX2L.csHigh entropy of concatenated method names: 'OcodFyRrm2', 'QwfdV3ElvY', 'CNxE1WpK7P', 'biaEYQ2lXP', 'xCXdS1c2Ew', 'xb7dv9sJNU', 'KUxdTnSOXI', 'on7dwlRtea', 'X3NdPC7LKK', 'ONydxq6VGF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, luO9kIbSScgVlQaNVi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bxKNj3yGIp', 'aC4NV54DPr', 'qgTNzcZbug', 'dj5g1vqKZN', 'QoHgYtbshE', 'NvbgN3xrtk', 'kDWggOWQjM', 'ga7DULtvuABvf23Owly'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, QjoCtKKvdeTml6x2c4.csHigh entropy of concatenated method names: 'f0P7AIItXC', 'KKF7JPCOiK', 'N7L7Dr8K6p', 'Aqt7COiH1a', 'QuT7MjKH41', 'Q2x7HgCRcK', 'd087IIHSiX', 'B0R7LI1NZq', 'v4Z794Lhv0', 'T407qCQjla'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, WGiqJwVKmhfFXVpbWq.csHigh entropy of concatenated method names: 'eEDtLdnNms', 'zWnt9mPbcX', 'NfOt2iWEr8', 'PHXtlSNDsF', 'gZ3t4xnc2k', 'n0KtUuvLc5', 'sodt5MN3Hv', 'FWWtkywIqI', 'u3EteDdJHf', 'mS2tSoZMA0'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, jFJ6fd3ddQMLadc52Wm.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'b0wXw08Flu', 'uDDXPbsnSn', 'KU1XxgugVy', 'RLAXuKsoLo', 'A2gXfl86Gd', 'KCOXOfKXIS', 'FERXbT9Nnj'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.45de130.4.raw.unpack, Reein8PgQXHy0KycGx.csHigh entropy of concatenated method names: 'x84Y7YgilO', 'nrrYZHLscX', 'SOQYoF8sl7', 'CifY8Z919L', 'VO8YRhmhxZ', 'BSlYsK6a9w', 'ctqly4Ne3x16cHsGgn', 'GCqYphc6T2GbsTBGa2', 'Se2YY1BNP2', 'nEpYgsCndi'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, V4uC3Iifq56IKQcfry.csHigh entropy of concatenated method names: 'JcqLcnHE8kRk7VHJhl', 'baAwnpSkPWAs4YMGxr', 'wTgrto4LNQ', 'imnL6GCB6AIFRqkhxN', 'RgtTUJcyZL', 'dHYrbjNADO', 'xiCr8b7Qs6', 'PT2rZj37UR', 'P1WruDgOtu', 'd71eKLY6YVFQv'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, vpednoN8EZgsJ4TDwx.csHigh entropy of concatenated method names: 'SvRTLtpnA', 'uJwWpedno', 'REZpgsJ4T', 'uwxys3A5Q', 'Tl3iTkB7U', 'EqRFtDP16', 'TW5lfqidm', 'wSKAUGlNW', 'LkrevaXpK', 'cwu0Op5AT'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, M2ootgS1CfuBsWFleq.csHigh entropy of concatenated method names: 'vZArptG6dd', 'KNbr0vUSq2', 'CmLrabUQpy', 'Oinr7PDnsX', 'DenrZseSs1', 'UJkafPiX5p', 'MXSaO0BEXs', 'KZBabedClb', 'XuVaFdZh7t', 'naRajZtyeE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, yBOc7lgHd6VrnlsTNx.csHigh entropy of concatenated method names: 'UPqdoU8QPl', 'DPSd8wVPIc', 'ToString', 'pMxdmcorhr', 'SNhd0fDIJD', 'PvNdhPrMOe', 'K5MdaSTlC1', 'EsIdr5I3NC', 'dkyd717yPa', 'm1DdZGOa5H'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, hraxQMhxnO8RmGZUUe.csHigh entropy of concatenated method names: 'Sb5Rew0NUm', 'kQiRv5pjio', 'mYlRwh6UCk', 'AFkRPgWbkF', 'rJFRl6TlL4', 'w80R3lsj6Z', 'V6hR4AStjU', 'QnrRUGM0Oh', 'oHxRBlGy5t', 'rGlR5UexwE'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, HBFKX1JVt9TEuOClus.csHigh entropy of concatenated method names: 'qnxDkx8Cp', 'pkrCGYPPw', 'a4eHqLIX7', 'GxLIMqn53', 'gy69MSsVx', 'eDGq7VxDc', 'ymuCutqRKZpRg7vuUR', 'n1qQnFAc9DEhvLpHQ8', 'MriEx2xJp', 'di8XfN7y4'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, OeU3cI8sp3OjCJn3Kf.csHigh entropy of concatenated method names: 'ToString', 'XxosSaUOgR', 'pCOslyfI6Y', 'Qcns3dZRg9', 'kRts4HyJNJ', 'FLYsUX4dKU', 'VmmsBUL8FS', 'diHs5TrmMV', 'cABskkZWna', 'Ortsy7lMLd'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, fDvwuDXcNnoxRn0R7w.csHigh entropy of concatenated method names: 'uFAnYrwVVs', 'trCnghZubq', 'bfknQWvbHe', 'h74nm31d24', 'xPwn0YoNRP', 'hETna4A6Yb', 'RxVnrqOYkg', 'HOaEbLb1d2', 'yNOEFixNkv', 'sTCEjvUgyI'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, uKNc5B3YlmhyRNdOetd.csHigh entropy of concatenated method names: 'fEBnAgJfTC', 'uHLnJbh8su', 'nfSnDVPMg9', 'xV8nCViDF1', 'EK2nMJAUpl', 'X0OnHLAJEt', 'Gp6nIFiTUV', 'zthnLmOiAL', 'GG2n9KZpKZ', 'naRnqIjx5w'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, P1VTvV0hsXjgi8LbY8.csHigh entropy of concatenated method names: 's9CgpR0WBt', 'zJdgmIPEaH', 'B08g0k4mMR', 'uW0ghX2J4M', 'ssggaex8Pq', 'hykgri8Thx', 'A2Ig7bw9K5', 'OcPgZo4opm', 'Ad8gGlD7YP', 'NoMgotyLBg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, o5bTuy6gKTgq9DpGpW.csHigh entropy of concatenated method names: 'J1w7mlkaEU', 'e7K7hql4A8', 'Wae7rekZx4', 'yX7rVuOA9j', 'rBarzXvjS2', 's7T71RenW7', 'vp37Y7T7Pu', 'ro17Nhgtmv', 'pNb7gn2s8x', 'IFD7QcNfs3'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, uZfeGhWjtboPaKuqIs.csHigh entropy of concatenated method names: 'Dispose', 'xhVYjodVmv', 'YfnNlA2sJ0', 'VkuccqBVbJ', 'YImYV0uFFT', 'tj6YzjIWxR', 'ProcessDialogKey', 'gduN1kBhqD', 'ernNYSiimi', 'qTxNNx3hJO'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, zOvuh6z4XEuwhwvtHd.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'gfHntRbjO6', 'NKvnRHBw95', 'IydnsaCObt', 'FLJndmYeZo', 'oC2nE9PiTU', 'AjWnna6lx3', 'dlJnX3futx'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, ylPS4VFN0pw8cwdurc.csHigh entropy of concatenated method names: 'D0MEmtKTnV', 'je6E01deJT', 'RpUEhs0rBs', 'xNcEa5gW0H', 'aEyErGxqmU', 'R1sE7LSJ4a', 'EcDEZVZUKY', 'Q3rEGomUjG', 'dZnEo45mba', 'dl1E84eh5C'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, qYt43Hw1x654cfr8dB.csHigh entropy of concatenated method names: 'wiY0wkx6QM', 'ckS0PJvcRP', 'RnI0xLyljp', 'ooT0uSARtS', 'b1Y0f59b9d', 'gdx0O7P9EB', 'dHE0bGphU1', 'UWU0FhcTtb', 'Wmw0jBHOH0', 'WNj0V62qpg'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, uWJfX3ONd7Hxnbpa08.csHigh entropy of concatenated method names: 'ByZE2LnrHO', 'lV9Elyw5Th', 'vptE3iOWvQ', 'R6iE40YhNN', 'X0kEw12wRj', 'PrkEU3mnjh', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, NirxcLpgnhABtVmpoV.csHigh entropy of concatenated method names: 'JG1aMNY1Dn', 'g98aI7syAS', 'DEVh3BfQH9', 'j2jh4jcGdP', 'D2lhU3CBpE', 'F9MhBUYMrE', 'Fpgh5HLRRq', 'lMFhktyeK8', 'h9PhyDcHqV', 'HKNheTKgfm'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, py9F9qQUTg99JaHyW8.csHigh entropy of concatenated method names: 'OpShCsmcqh', 'PFVhHD3E3j', 'c3ThLOWPvP', 'Ldlh9Y9l41', 'F3RhRwBh6a', 'jtphsjuhNY', 'XVZhdnSWL9', 'GYkhE8PQdj', 'SUOhnKtPy8', 'noXhXWkur6'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, KxecM573EOlWiRyX2L.csHigh entropy of concatenated method names: 'OcodFyRrm2', 'QwfdV3ElvY', 'CNxE1WpK7P', 'biaEYQ2lXP', 'xCXdS1c2Ew', 'xb7dv9sJNU', 'KUxdTnSOXI', 'on7dwlRtea', 'X3NdPC7LKK', 'ONydxq6VGF'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, luO9kIbSScgVlQaNVi.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'bxKNj3yGIp', 'aC4NV54DPr', 'qgTNzcZbug', 'dj5g1vqKZN', 'QoHgYtbshE', 'NvbgN3xrtk', 'kDWggOWQjM', 'ga7DULtvuABvf23Owly'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, QjoCtKKvdeTml6x2c4.csHigh entropy of concatenated method names: 'f0P7AIItXC', 'KKF7JPCOiK', 'N7L7Dr8K6p', 'Aqt7COiH1a', 'QuT7MjKH41', 'Q2x7HgCRcK', 'd087IIHSiX', 'B0R7LI1NZq', 'v4Z794Lhv0', 'T407qCQjla'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, WGiqJwVKmhfFXVpbWq.csHigh entropy of concatenated method names: 'eEDtLdnNms', 'zWnt9mPbcX', 'NfOt2iWEr8', 'PHXtlSNDsF', 'gZ3t4xnc2k', 'n0KtUuvLc5', 'sodt5MN3Hv', 'FWWtkywIqI', 'u3EteDdJHf', 'mS2tSoZMA0'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, jFJ6fd3ddQMLadc52Wm.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'b0wXw08Flu', 'uDDXPbsnSn', 'KU1XxgugVy', 'RLAXuKsoLo', 'A2gXfl86Gd', 'KCOXOfKXIS', 'FERXbT9Nnj'
                      Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.465a550.6.raw.unpack, Reein8PgQXHy0KycGx.csHigh entropy of concatenated method names: 'x84Y7YgilO', 'nrrYZHLscX', 'SOQYoF8sl7', 'CifY8Z919L', 'VO8YRhmhxZ', 'BSlYsK6a9w', 'ctqly4Ne3x16cHsGgn', 'GCqYphc6T2GbsTBGa2', 'Se2YY1BNP2', 'nEpYgsCndi'
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7404, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: A90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 29E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 2740000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 74E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 6ED0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 84E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 94E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 9A20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: AA20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: BA20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: DE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: 4860000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWindow / User API: threadDelayed 2388Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWindow / User API: threadDelayed 2489Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7424Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -100000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7756Thread sleep count: 2388 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7756Thread sleep count: 2489 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99435s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99328s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -99109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98999s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98775s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98656s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98546s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98437s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98327s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98218s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -98109s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97999s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97890s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97781s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97671s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97562s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -97452s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe TID: 7748Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 100000Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99890Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99781Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99671Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99562Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99435Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99328Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99218Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 99109Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98999Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98890Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98775Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98656Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98546Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98437Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98327Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98218Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 98109Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97999Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97890Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97781Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97671Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97562Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 97452Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7588, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1699372281.0000000004F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1697066851.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7588, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.47759f0.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7404, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe PID: 7588, type: MEMORYSTR
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.39e9970.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe.4f90000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1699372281.0000000004F90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1697066851.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      2
                      OS Credential Dumping
                      1
                      File and Directory Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Ingress Tool Transfer
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      Credentials in Registry
                      24
                      System Information Discovery
                      Remote Desktop Protocol2
                      Data from Local System
                      11
                      Encrypted Channel
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                      Obfuscated Files or Information
                      Security Account Manager1
                      Query Registry
                      SMB/Windows Admin Shares1
                      Email Collection
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                      Software Packing
                      NTDS111
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture2
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets1
                      Process Discovery
                      SSHKeylogging23
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials141
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                      Virtualization/Sandbox Evasion
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                      Process Injection
                      Proc Filesystem1
                      System Network Configuration Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe21%ReversingLabsWin32.Trojan.Generic
                      SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe36%VirustotalBrowse
                      SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      mail.albushrametalic.com2%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://www.tiro.com0%URL Reputationsafe
                      http://www.goodfont.co.kr0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://www.carterandcone.coml0%URL Reputationsafe
                      http://r3.i.lencr.org/00%URL Reputationsafe
                      http://www.sajatypeworks.com0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.typography.netD0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                      http://x1.c.lencr.org/00%URL Reputationsafe
                      http://x1.i.lencr.org/00%URL Reputationsafe
                      http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                      http://r3.o.lencr.org00%URL Reputationsafe
                      http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                      http://www.sandoll.co.kr0%URL Reputationsafe
                      http://www.urwpp.deDPlease0%URL Reputationsafe
                      http://www.sakkal.com0%URL Reputationsafe
                      http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                      http://mail.albushrametalic.com0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                      http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                      http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                      http://mail.albushrametalic.com2%VirustotalBrowse
                      http://www.zhongyicts.com.cn1%VirustotalBrowse
                      http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                      http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                      http://www.founder.com.cn/cn0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      mail.albushrametalic.com
                      50.87.218.140
                      truetrueunknown
                      api.ipify.org
                      104.26.12.205
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://account.dyn.com/SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.ipify.org/tSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://r3.i.lencr.org/0SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • 0%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            • URL Reputation: safe
                                            unknown
                                            https://api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://mail.albushrametalic.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • 2%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://x1.c.lencr.org/0SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://x1.i.lencr.org/0SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://r3.o.lencr.org0SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2879571005.0000000000DC0000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2878983807.0000000000D8C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • 1%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000002.00000002.2880131729.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe, 00000000.00000002.1701006031.00000000069B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      104.26.12.205
                                                      api.ipify.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      50.87.218.140
                                                      mail.albushrametalic.comUnited States
                                                      46606UNIFIEDLAYER-AS-1UStrue
                                                      Joe Sandbox version:40.0.0 Tourmaline
                                                      Analysis ID:1431495
                                                      Start date and time:2024-04-25 10:27:08 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 6m 38s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:7
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 117
                                                      • Number of non-executed functions: 17
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      10:27:56API Interceptor25x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      104.26.12.205Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                                      • api.ipify.org/?format=json
                                                      Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                      • api.ipify.org/?format=json
                                                      SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                                      • api.ipify.org/
                                                      lods.cmdGet hashmaliciousRemcosBrowse
                                                      • api.ipify.org/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      Spare part list.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 172.67.74.152
                                                      responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                      • 104.26.12.205
                                                      F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                      • 104.26.12.205
                                                      New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.13.205
                                                      DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 104.26.13.205
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUShttp://survey-smiles.comGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      http://rfpteams.ksplastlc.netGet hashmaliciousUnknownBrowse
                                                      • 172.67.142.208
                                                      https://app.milanote.com/1RZbnl1zfBXuaf?p=r2B66sphbV4Get hashmaliciousUnknownBrowse
                                                      • 162.247.243.29
                                                      SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      http://decktop.us/gORiyfGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.16.117.116
                                                      https://ortelia.com/download-ortelia-curator/Get hashmaliciousHavocBrowse
                                                      • 1.1.1.1
                                                      o7b91j8vnJ.exeGet hashmaliciousLummaCBrowse
                                                      • 172.67.163.209
                                                      http://confirmartucuentamsnaquimx.hstn.me/login.live.com_login_verify_credentials_outlook.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 172.64.151.101
                                                      https://ernestjcrist.icu/23d80j2d/qwd13d8jqd/index.html?13813e8=0101%2020596-12595&13813e8=https://femininplurielles.comGet hashmaliciousTechSupportScamBrowse
                                                      • 104.21.53.38
                                                      https://fassouyatajadalravuij.blob.core.windows.net/fassouyatajadalravuij/1.html?KIUS8wH0YY7cB2NMwxGsVoa5iezV7W9cvLqamEPM8HdxqBLgYyX6Goh6aNwgjitRkRWLcAfZPzQwfAIRlIAPQ3jfogxjD1t9nA60#cl/26081_md/7/18507/5419/19036/1614238Get hashmaliciousPhisherBrowse
                                                      • 104.21.80.104
                                                      UNIFIEDLAYER-AS-1USSecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 192.185.35.67
                                                      http://pengoodet.liveGet hashmaliciousUnknownBrowse
                                                      • 69.89.24.98
                                                      http://electricalsworksflorida.com/j6uGet hashmaliciousHTMLPhisherBrowse
                                                      • 192.185.84.91
                                                      https://gamma.app/docs/Shared-Document-9j9g6z8iqo1w0uuGet hashmaliciousHTMLPhisherBrowse
                                                      • 192.185.97.246
                                                      Total Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 192.185.129.60
                                                      https://content.amanet.org/?m=CiGW.81UwlU3LD6ZH5M4ZoUXv03dAeWfC&r=https://control.mailblaze.com/index.php/survey/ps97367sjy584Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                      • 162.241.114.35
                                                      http://keeper.comGet hashmaliciousUnknownBrowse
                                                      • 192.185.65.45
                                                      https://ken.fnh.temporary.site/wp-includes/sitemaps/updateGet hashmaliciousUnknownBrowse
                                                      • 192.185.46.79
                                                      5RiFmXTOMp.elfGet hashmaliciousMiraiBrowse
                                                      • 142.7.26.76
                                                      SARL RABINEAU Order FA2495.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 192.254.225.166
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      3b5074b1b5d032e5620f69f9f700ff0eMinutes_of_15th_Session_of_PSC.pdf.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      Minutes_of_15th_Session_of_PSC.pdf.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      SecuriteInfo.com.Win32.PWSX-gen.25877.26069.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 104.26.12.205
                                                      Database4.exeGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                                      • 104.26.12.205
                                                      Control-Tributario_KFRCkzlbCHUSEBMRSECA.zipGet hashmaliciousUnknownBrowse
                                                      • 104.26.12.205
                                                      Swift Payment.batGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                      • 104.26.12.205
                                                      https://8fq7c.eceydri.com/WK9D/Get hashmaliciousHTMLPhisherBrowse
                                                      • 104.26.12.205
                                                      FW_ FHAS Inc_ - Private and Confidential.msgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                      • 104.26.12.205
                                                      Proforma Request.exeGet hashmaliciousAgentTeslaBrowse
                                                      • 104.26.12.205
                                                      No context
                                                      Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1216
                                                      Entropy (8bit):5.34331486778365
                                                      Encrypted:false
                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                      Malicious:false
                                                      Reputation:high, very likely benign file
                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):7.944329695138337
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Windows Screen Saver (13104/52) 0.07%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                                      File name:SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      File size:720'896 bytes
                                                      MD5:0213307d4a5c33c73fc8763498a054e5
                                                      SHA1:2c6978c737ad7b1a9547ed3365fef15996d98137
                                                      SHA256:6266398586cea7e8cc4154202bb9f5541b1a6b6b5640f0efdd2f2ef9e82c7ae6
                                                      SHA512:154fe0dc2e3184304ccdc360e9d10c025017b318998d405e9a8e74dc8161e40e1493aede3e8efcd412e62770dc6cc5c0afb26d5b1685ac0b692cfbf8c1aa8c62
                                                      SSDEEP:12288:sWYIPXjxannnHg2SPMey7LKykiCjOkOt5hNF4rdYJpklo0rlBtVpd7kqD+:sWYIPFannnHg2SonkjOkiNS5YwrlBtn4
                                                      TLSH:20E4238663E9472BF9BD13B018341910AB79E848D973F3191DC416D85E23B89D7F0B9B
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....)f..............0...... ......:.... ........@.. .......................@............`................................
                                                      Icon Hash:c14e4c4c4c4c4f41
                                                      Entrypoint:0x4af63a
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6629D29A [Thu Apr 25 03:48:42 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      xor eax, 35455354h
                                                      xor dword ptr [edi+eax*2], esi
                                                      dec eax
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [ebx+4Ah], dl
                                                      push ebx
                                                      cmp byte ptr [eax+edi+34h], al
                                                      inc ebx
                                                      inc ebx
                                                      xor al, 37h
                                                      xor eax, 00000035h
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xaf5e80x4f.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xb00000x1008.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xb20000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xad6600xad8007a7a359c432e0833061e3f7d866dee20False0.953274157961095data7.969312774312396IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xb00000x10080x1800a06cb0134df38ab69b0029bcc352613aFalse0.5413411458333334data5.082436440506891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xb20000xc0x8009b87eaf445ec58db394ef287a1f8ad79False0.015625data0.03037337037012526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xb00c80xc08PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9308441558441558
                                                      RT_GROUP_ICON0xb0ce00x14data1.05
                                                      RT_VERSION0xb0d040x300MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"0.4427083333333333
                                                      DLLImport
                                                      mscoree.dll_CorExeMain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 25, 2024 10:28:00.812685013 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:00.812736988 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:00.812823057 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:00.822607040 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:00.822634935 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.055665016 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.055753946 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:01.062011003 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:01.062035084 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.062421083 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.110483885 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:01.217885971 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:01.260152102 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.355022907 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.355082989 CEST44349733104.26.12.205192.168.2.4
                                                      Apr 25, 2024 10:28:01.355140924 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:01.361155987 CEST49733443192.168.2.4104.26.12.205
                                                      Apr 25, 2024 10:28:02.036662102 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.195396900 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.195542097 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.490710974 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.490926027 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.649997950 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.650208950 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.810406923 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.810924053 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.980613947 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.980679035 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.980720997 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.980772972 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:02.980773926 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:02.980822086 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.075043917 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.234816074 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.237978935 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.396980047 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.398127079 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.557307959 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.557698965 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.757386923 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.809722900 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.810090065 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:03.968780041 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.968823910 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:03.969353914 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.169306993 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.187998056 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.188215971 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.346904039 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.347013950 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.347800016 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.347929001 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.347929001 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.347929001 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:28:04.506491899 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.506736040 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.507910013 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:28:04.563600063 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:29:41.907696962 CEST49736587192.168.2.450.87.218.140
                                                      Apr 25, 2024 10:29:42.068231106 CEST5874973650.87.218.140192.168.2.4
                                                      Apr 25, 2024 10:29:42.069293976 CEST49736587192.168.2.450.87.218.140
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Apr 25, 2024 10:28:00.694180965 CEST5919853192.168.2.41.1.1.1
                                                      Apr 25, 2024 10:28:00.804600954 CEST53591981.1.1.1192.168.2.4
                                                      Apr 25, 2024 10:28:01.886472940 CEST5596453192.168.2.41.1.1.1
                                                      Apr 25, 2024 10:28:02.035995007 CEST53559641.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Apr 25, 2024 10:28:00.694180965 CEST192.168.2.41.1.1.10x8d35Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                      Apr 25, 2024 10:28:01.886472940 CEST192.168.2.41.1.1.10x5806Standard query (0)mail.albushrametalic.comA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Apr 25, 2024 10:28:00.804600954 CEST1.1.1.1192.168.2.40x8d35No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                      Apr 25, 2024 10:28:00.804600954 CEST1.1.1.1192.168.2.40x8d35No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                      Apr 25, 2024 10:28:00.804600954 CEST1.1.1.1192.168.2.40x8d35No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                      Apr 25, 2024 10:28:02.035995007 CEST1.1.1.1192.168.2.40x5806No error (0)mail.albushrametalic.com50.87.218.140A (IP address)IN (0x0001)false
                                                      • api.ipify.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449733104.26.12.2054437588C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-04-25 08:28:01 UTC155OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                      Host: api.ipify.org
                                                      Connection: Keep-Alive
                                                      2024-04-25 08:28:01 UTC211INHTTP/1.1 200 OK
                                                      Date: Thu, 25 Apr 2024 08:28:01 GMT
                                                      Content-Type: text/plain
                                                      Content-Length: 14
                                                      Connection: close
                                                      Vary: Origin
                                                      CF-Cache-Status: DYNAMIC
                                                      Server: cloudflare
                                                      CF-RAY: 879cf50bfbcb7b9f-ATL
                                                      2024-04-25 08:28:01 UTC14INData Raw: 31 38 35 2e 31 35 32 2e 36 36 2e 32 33 30
                                                      Data Ascii: 185.152.66.230


                                                      TimestampSource PortDest PortSource IPDest IPCommands
                                                      Apr 25, 2024 10:28:02.490710974 CEST5874973650.87.218.140192.168.2.4220-box2229.bluehost.com ESMTP Exim 4.96.2 #2 Thu, 25 Apr 2024 02:28:02 -0600
                                                      220-We do not authorize the use of this system to transport unsolicited,
                                                      220 and/or bulk e-mail.
                                                      Apr 25, 2024 10:28:02.490926027 CEST49736587192.168.2.450.87.218.140EHLO 642294
                                                      Apr 25, 2024 10:28:02.649997950 CEST5874973650.87.218.140192.168.2.4250-box2229.bluehost.com Hello 642294 [185.152.66.230]
                                                      250-SIZE 52428800
                                                      250-8BITMIME
                                                      250-PIPELINING
                                                      250-PIPECONNECT
                                                      250-AUTH PLAIN LOGIN
                                                      250-STARTTLS
                                                      250 HELP
                                                      Apr 25, 2024 10:28:02.650208950 CEST49736587192.168.2.450.87.218.140STARTTLS
                                                      Apr 25, 2024 10:28:02.810406923 CEST5874973650.87.218.140192.168.2.4220 TLS go ahead

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:10:27:55
                                                      Start date:25/04/2024
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"
                                                      Imagebase:0x3d0000
                                                      File size:720'896 bytes
                                                      MD5 hash:0213307D4A5C33C73FC8763498A054E5
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1699372281.0000000004F90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1697066851.00000000039E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1697066851.000000000473B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:10:27:59
                                                      Start date:25/04/2024
                                                      Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18376.4403.exe"
                                                      Imagebase:0x620000
                                                      File size:720'896 bytes
                                                      MD5 hash:0213307D4A5C33C73FC8763498A054E5
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2880131729.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2880131729.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2880131729.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2878165030.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:9.7%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:18.7%
                                                        Total number of Nodes:267
                                                        Total number of Limit Nodes:15
                                                        execution_graph 36769 a94668 36770 a9467a 36769->36770 36771 a94686 36770->36771 36775 a94778 36770->36775 36780 a94204 36771->36780 36773 a946a5 36776 a9479d 36775->36776 36784 a94879 36776->36784 36788 a94888 36776->36788 36781 a9420f 36780->36781 36796 a95e78 36781->36796 36783 a977cc 36783->36773 36786 a948af 36784->36786 36785 a9498c 36785->36785 36786->36785 36792 a944e4 36786->36792 36790 a948af 36788->36790 36789 a9498c 36790->36789 36791 a944e4 CreateActCtxA 36790->36791 36791->36789 36793 a95918 CreateActCtxA 36792->36793 36795 a959db 36793->36795 36797 a95e83 36796->36797 36800 a973b0 36797->36800 36799 a9794d 36799->36783 36801 a973bb 36800->36801 36804 a973e0 36801->36804 36803 a97a22 36803->36799 36805 a973eb 36804->36805 36808 a97410 36805->36808 36807 a97b25 36807->36803 36809 a9741b 36808->36809 36811 a98d93 36809->36811 36814 a9b440 36809->36814 36810 a98dd1 36810->36807 36811->36810 36818 a9d530 36811->36818 36822 a9b468 36814->36822 36826 a9b478 36814->36826 36815 a9b456 36815->36811 36819 a9d551 36818->36819 36820 a9d575 36819->36820 36849 a9d6e0 36819->36849 36820->36810 36823 a9b478 36822->36823 36829 a9b55f 36823->36829 36824 a9b487 36824->36815 36828 a9b55f 2 API calls 36826->36828 36827 a9b487 36827->36815 36828->36827 36830 a9b581 36829->36830 36831 a9b5a4 36829->36831 36830->36831 36837 a9b7f8 36830->36837 36841 a9b808 36830->36841 36831->36824 36832 a9b59c 36832->36831 36833 a9b7a8 GetModuleHandleW 36832->36833 36834 a9b7d5 36833->36834 36834->36824 36838 a9b81c 36837->36838 36840 a9b841 36838->36840 36845 a9afb0 36838->36845 36840->36832 36842 a9b81c 36841->36842 36843 a9afb0 LoadLibraryExW 36842->36843 36844 a9b841 36842->36844 36843->36844 36844->36832 36846 a9b9e8 LoadLibraryExW 36845->36846 36848 a9ba61 36846->36848 36848->36840 36850 a9d6ed 36849->36850 36852 a9d727 36850->36852 36853 a9d018 36850->36853 36852->36820 36855 a9d023 36853->36855 36854 a9e038 36855->36854 36857 a9d144 36855->36857 36858 a9d14f 36857->36858 36859 a97410 2 API calls 36858->36859 36860 a9e0a7 36859->36860 36860->36854 37086 a9d7f8 37087 a9d83e GetCurrentProcess 37086->37087 37089 a9d889 37087->37089 37090 a9d890 GetCurrentThread 37087->37090 37089->37090 37091 a9d8cd GetCurrentProcess 37090->37091 37092 a9d8c6 37090->37092 37093 a9d903 GetCurrentThreadId 37091->37093 37092->37091 37095 a9d95c 37093->37095 37096 4dcdf38 37098 a98ac8 2 API calls 37096->37098 37099 a98a8f 2 API calls 37096->37099 37100 a97410 2 API calls 37096->37100 37097 4dcdf4b 37098->37097 37099->37097 37100->37097 37101 a9da40 DuplicateHandle 37102 a9dad6 37101->37102 36861 53dd971 36866 53de628 36861->36866 36885 53de638 36861->36885 36904 53de696 36861->36904 36862 53dd980 36867 53de652 36866->36867 36868 53de676 36867->36868 36924 53dec9d 36867->36924 36932 53df386 36867->36932 36937 53dedc6 36867->36937 36942 53deac6 36867->36942 36947 53dece7 36867->36947 36955 53df184 36867->36955 36959 53dea44 36867->36959 36963 53deb09 36867->36963 36968 53deb90 36867->36968 36973 53df0ba 36867->36973 36978 53dea9a 36867->36978 36983 53deabb 36867->36983 36988 53debdb 36867->36988 36996 53deb3b 36867->36996 37001 53def1b 36867->37001 37006 53ded3e 36867->37006 36868->36862 36886 53de652 36885->36886 36887 53de676 36886->36887 36888 53dec9d 4 API calls 36886->36888 36889 53ded3e 2 API calls 36886->36889 36890 53def1b 2 API calls 36886->36890 36891 53deb3b 2 API calls 36886->36891 36892 53debdb 4 API calls 36886->36892 36893 53deabb 2 API calls 36886->36893 36894 53dea9a 2 API calls 36886->36894 36895 53df0ba 2 API calls 36886->36895 36896 53deb90 2 API calls 36886->36896 36897 53deb09 2 API calls 36886->36897 36898 53dea44 2 API calls 36886->36898 36899 53df184 2 API calls 36886->36899 36900 53dece7 4 API calls 36886->36900 36901 53deac6 2 API calls 36886->36901 36902 53dedc6 2 API calls 36886->36902 36903 53df386 2 API calls 36886->36903 36887->36862 36888->36887 36889->36887 36890->36887 36891->36887 36892->36887 36893->36887 36894->36887 36895->36887 36896->36887 36897->36887 36898->36887 36899->36887 36900->36887 36901->36887 36902->36887 36903->36887 36905 53de624 36904->36905 36907 53de699 36904->36907 36906 53de676 36905->36906 36908 53dec9d 4 API calls 36905->36908 36909 53ded3e 2 API calls 36905->36909 36910 53def1b 2 API calls 36905->36910 36911 53deb3b 2 API calls 36905->36911 36912 53debdb 4 API calls 36905->36912 36913 53deabb 2 API calls 36905->36913 36914 53dea9a 2 API calls 36905->36914 36915 53df0ba 2 API calls 36905->36915 36916 53deb90 2 API calls 36905->36916 36917 53deb09 2 API calls 36905->36917 36918 53dea44 2 API calls 36905->36918 36919 53df184 2 API calls 36905->36919 36920 53dece7 4 API calls 36905->36920 36921 53deac6 2 API calls 36905->36921 36922 53dedc6 2 API calls 36905->36922 36923 53df386 2 API calls 36905->36923 36906->36862 36907->36862 36908->36906 36909->36906 36910->36906 36911->36906 36912->36906 36913->36906 36914->36906 36915->36906 36916->36906 36917->36906 36918->36906 36919->36906 36920->36906 36921->36906 36922->36906 36923->36906 36925 53debda 36924->36925 36926 53deaa3 36924->36926 36925->36924 36925->36926 37010 53dcb78 36925->37010 37014 53dcb71 36925->37014 36927 53decc3 36926->36927 37018 53df738 36926->37018 37023 53df728 36926->37023 36927->36868 36933 53df393 36932->36933 36934 53deddd 36932->36934 36934->36932 37036 53dd148 36934->37036 37040 53dd141 36934->37040 36938 53dedcc 36937->36938 36939 53df393 36938->36939 36940 53dd148 WriteProcessMemory 36938->36940 36941 53dd141 WriteProcessMemory 36938->36941 36940->36938 36941->36938 36943 53deaa3 36942->36943 36944 53dec97 36943->36944 36945 53df738 2 API calls 36943->36945 36946 53df728 2 API calls 36943->36946 36944->36868 36945->36944 36946->36944 36948 53ded0a 36947->36948 36949 53decc3 36948->36949 36951 53dd148 WriteProcessMemory 36948->36951 36952 53dd141 WriteProcessMemory 36948->36952 36949->36868 36950 53deaa3 36950->36949 36953 53df738 2 API calls 36950->36953 36954 53df728 2 API calls 36950->36954 36951->36950 36952->36950 36953->36949 36954->36949 36957 53dcb78 Wow64SetThreadContext 36955->36957 36958 53dcb71 Wow64SetThreadContext 36955->36958 36956 53df19e 36956->36868 36957->36956 36958->36956 37044 53dd3c5 36959->37044 37048 53dd3d0 36959->37048 36964 53deaa3 36963->36964 36965 53decc3 36964->36965 36966 53df738 2 API calls 36964->36966 36967 53df728 2 API calls 36964->36967 36965->36868 36966->36965 36967->36965 36969 53deaa3 36968->36969 36970 53deb7e 36968->36970 36969->36970 36971 53df738 2 API calls 36969->36971 36972 53df728 2 API calls 36969->36972 36970->36868 36971->36970 36972->36970 36974 53df100 36973->36974 36976 53dd148 WriteProcessMemory 36974->36976 36977 53dd141 WriteProcessMemory 36974->36977 36975 53df28b 36975->36868 36976->36975 36977->36975 36979 53deaa3 36978->36979 36980 53decc3 36979->36980 36981 53df738 2 API calls 36979->36981 36982 53df728 2 API calls 36979->36982 36980->36868 36981->36980 36982->36980 36984 53df3d7 36983->36984 37052 53dd088 36984->37052 37056 53dd080 36984->37056 36985 53df3f5 36994 53dcb78 Wow64SetThreadContext 36988->36994 36995 53dcb71 Wow64SetThreadContext 36988->36995 36989 53deaa3 36991 53decc3 36989->36991 36992 53df738 2 API calls 36989->36992 36993 53df728 2 API calls 36989->36993 36990 53debda 36990->36988 36990->36989 36991->36868 36992->36991 36993->36991 36994->36990 36995->36990 36997 53deaa3 36996->36997 36998 53decc3 36997->36998 36999 53df738 2 API calls 36997->36999 37000 53df728 2 API calls 36997->37000 36998->36868 36999->36998 37000->36998 37002 53deaa3 37001->37002 37003 53decc3 37002->37003 37004 53df738 2 API calls 37002->37004 37005 53df728 2 API calls 37002->37005 37003->36868 37004->37003 37005->37003 37060 53dd238 37006->37060 37064 53dd230 37006->37064 37007 53ded10 37011 53dcbbd Wow64SetThreadContext 37010->37011 37013 53dcc05 37011->37013 37013->36925 37015 53dcbbd Wow64SetThreadContext 37014->37015 37017 53dcc05 37015->37017 37017->36925 37019 53df74d 37018->37019 37028 53dcac8 37019->37028 37032 53dcac0 37019->37032 37020 53df760 37020->36927 37024 53df738 37023->37024 37026 53dcac8 ResumeThread 37024->37026 37027 53dcac0 ResumeThread 37024->37027 37025 53df760 37025->36927 37026->37025 37027->37025 37029 53dcb08 ResumeThread 37028->37029 37031 53dcb39 37029->37031 37031->37020 37033 53dcac8 ResumeThread 37032->37033 37035 53dcb39 37033->37035 37035->37020 37037 53dd190 WriteProcessMemory 37036->37037 37039 53dd1e7 37037->37039 37039->36934 37041 53dd148 WriteProcessMemory 37040->37041 37043 53dd1e7 37041->37043 37043->36934 37045 53dd3d0 CreateProcessA 37044->37045 37047 53dd61b 37045->37047 37047->37047 37049 53dd459 CreateProcessA 37048->37049 37051 53dd61b 37049->37051 37051->37051 37053 53dd0c8 VirtualAllocEx 37052->37053 37055 53dd105 37053->37055 37055->36985 37057 53dd088 VirtualAllocEx 37056->37057 37059 53dd105 37057->37059 37059->36985 37061 53dd283 ReadProcessMemory 37060->37061 37063 53dd2c7 37061->37063 37063->37007 37065 53dd238 ReadProcessMemory 37064->37065 37067 53dd2c7 37065->37067 37067->37007 37068 4dce590 37069 4dce5b2 37068->37069 37072 a97410 2 API calls 37068->37072 37073 a98a8f 37068->37073 37080 a98ac8 37068->37080 37072->37069 37074 a98a96 37073->37074 37075 a98a94 37073->37075 37075->37074 37077 a98d93 37075->37077 37078 a9b440 2 API calls 37075->37078 37076 a98dd1 37076->37069 37077->37076 37079 a9d530 2 API calls 37077->37079 37078->37077 37079->37076 37081 a98ae0 37080->37081 37083 a98d93 37081->37083 37084 a9b440 2 API calls 37081->37084 37082 a98dd1 37082->37069 37083->37082 37085 a9d530 2 API calls 37083->37085 37084->37083 37085->37082 37103 53df7c0 37104 53df94b 37103->37104 37106 53df7e6 37103->37106 37106->37104 37107 53dba28 37106->37107 37108 53dfa40 PostMessageW 37107->37108 37109 53dfaac 37108->37109 37109->37106
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 20d7db2abe722183feb04ddcdad48aadbadd52aca4cfc138871fcc79d564f1f4
                                                        • Instruction ID: 141d5cd67bf8b3a96a7182ecdfb0e73b6964cb23fd7b37e48df4b91544768abb
                                                        • Opcode Fuzzy Hash: 20d7db2abe722183feb04ddcdad48aadbadd52aca4cfc138871fcc79d564f1f4
                                                        • Instruction Fuzzy Hash: F9C1BB707016008FDB29EBB5C550B6EB7F7AF89704F24856ED14ACB295DB34E902CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bae24afef353553a1e985952db17e3d4c9e674780d8e318643e413a5c114140d
                                                        • Instruction ID: b244880e95556d1593f01dd1aa9043b55bbad9745e6dde1d1a16881d9328d0ee
                                                        • Opcode Fuzzy Hash: bae24afef353553a1e985952db17e3d4c9e674780d8e318643e413a5c114140d
                                                        • Instruction Fuzzy Hash: C5412C7690A228DFDB20CF24E8847E8FBBABB4A305F1451D5D40EA7251C7749AC5CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f78513203f339bfd26d56945f250fea94c4df72f43bb9820f50826d03c2c897e
                                                        • Instruction ID: 374171b5ddb3ac0b34e208b3c87209ae731f66f535eac5833911b52279f4c244
                                                        • Opcode Fuzzy Hash: f78513203f339bfd26d56945f250fea94c4df72f43bb9820f50826d03c2c897e
                                                        • Instruction Fuzzy Hash: C6411B7AD0A228DFDB20CF64E8847E8FBB9FB4A301F5451D9D40AA7251CB745A85CF11
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2afae61f79db9a098945f3399491ad2b3c455186852252f9bcb5748bb50f6371
                                                        • Instruction ID: 05e3b7c9fc23e4ab3e346311346bc6582e9333a68f3f2e8b4749b19f78ebffd4
                                                        • Opcode Fuzzy Hash: 2afae61f79db9a098945f3399491ad2b3c455186852252f9bcb5748bb50f6371
                                                        • Instruction Fuzzy Hash: 48413A7AD0A258DFDB20CF64E8847ECFBB9BB4A301F0551A5D40EA7251CB748A85CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f430102cb1c60d22c2c1e59bed9f6c30e6e882b09b5c828bc77a27c4097df740
                                                        • Instruction ID: a04ef30f70f773ef65f8931c3922ba3d0cc6b0405af3a91475b24b36edac0254
                                                        • Opcode Fuzzy Hash: f430102cb1c60d22c2c1e59bed9f6c30e6e882b09b5c828bc77a27c4097df740
                                                        • Instruction Fuzzy Hash: 56410976906228DFDB21CF64E888BE8FBB9BB4A305F0451D5D40EA7251C7749AC4CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a2ce6949e0be79eb25347093b5663d2474f00f1fc967f4f5b243466afe8bd2e
                                                        • Instruction ID: 9ba1f8cde9054e5dde94acccbe94ad03a1b37b556145a2b9b329d298a5163eb3
                                                        • Opcode Fuzzy Hash: 4a2ce6949e0be79eb25347093b5663d2474f00f1fc967f4f5b243466afe8bd2e
                                                        • Instruction Fuzzy Hash: 54411A7A90A228DFCB20CF24E8847E8FBB9BB4A301F1451D5D40AA7251CB749AC4CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 21a687659ce71ffca169a34874c51ca0227abc0b613a8246cf227f7314f74a95
                                                        • Instruction ID: c4f8cb8a9cd87e399c49537b717a99d0ad3c9083311a1dfb7b0e810df06f9b6b
                                                        • Opcode Fuzzy Hash: 21a687659ce71ffca169a34874c51ca0227abc0b613a8246cf227f7314f74a95
                                                        • Instruction Fuzzy Hash: 3A410B7A90A268DFDB20CF24E8897E8FBB9BB4A315F0151D5D00EA7251CB744AC4CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 24c510d69014c26b4330589909466271625e7c7509428629f6e74df65be984cd
                                                        • Instruction ID: b2c536527ef136340580d4b2a2a30a87753c43cd1f8173327eca7599e4b274e8
                                                        • Opcode Fuzzy Hash: 24c510d69014c26b4330589909466271625e7c7509428629f6e74df65be984cd
                                                        • Instruction Fuzzy Hash: C9311D7A90A218DFDB20CF64E8887E8FBB9FB4A315F0551D5D40AA7251C7748AC5CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 185e677b1c44581e720c537f9f780d7241921f14b31a214cc05d5b9012fac535
                                                        • Instruction ID: 6e1f0304b8ec593893205adfa7b9313869e614e72f00bad6de2fb7a3953d805d
                                                        • Opcode Fuzzy Hash: 185e677b1c44581e720c537f9f780d7241921f14b31a214cc05d5b9012fac535
                                                        • Instruction Fuzzy Hash: F931F67A90A228DFDB20CF64E8887E8FBB9BB4A311F4151D5D00EA7251CB744AC4CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d55944d4fa6538c14847ec07e42b5ff3ad25db369ac33a450c1ba3a4f2b37535
                                                        • Instruction ID: 2a12cf915ef72941eae19c6d9234677efaec53ac2458fada167c56d747f69b35
                                                        • Opcode Fuzzy Hash: d55944d4fa6538c14847ec07e42b5ff3ad25db369ac33a450c1ba3a4f2b37535
                                                        • Instruction Fuzzy Hash: 1B31297AD4A228DFDB20CF64E8847E8FBB9BB4A301F0051D5D00AA7251CB744A84CF21
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 978ff98326461a6a0c33e9c708daa993472bf104db50df34205931604dff78ba
                                                        • Instruction ID: 62c1291fc2f8cb97dec32688dea67286a5f4323f2484e87fc0e7a4137a570843
                                                        • Opcode Fuzzy Hash: 978ff98326461a6a0c33e9c708daa993472bf104db50df34205931604dff78ba
                                                        • Instruction Fuzzy Hash: FCE04F77E4E008EFCB00EEA4B9881F8F7BDAB5B252F0530A1940E97601D67049605A74
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 299 a9d7f8-a9d887 GetCurrentProcess 303 a9d889-a9d88f 299->303 304 a9d890-a9d8c4 GetCurrentThread 299->304 303->304 305 a9d8cd-a9d901 GetCurrentProcess 304->305 306 a9d8c6-a9d8cc 304->306 308 a9d90a-a9d922 305->308 309 a9d903-a9d909 305->309 306->305 312 a9d92b-a9d95a GetCurrentThreadId 308->312 309->308 313 a9d95c-a9d962 312->313 314 a9d963-a9d9c5 312->314 313->314
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 00A9D876
                                                        • GetCurrentThread.KERNEL32 ref: 00A9D8B3
                                                        • GetCurrentProcess.KERNEL32 ref: 00A9D8F0
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A9D949
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 8c4360b2d4fdf6338a249d8fb0402a2403643a00b17f231d898364b9cab06533
                                                        • Instruction ID: b075bf6fd949823f64c1bb3b079b3440433bd673f2b56b594141312043649b85
                                                        • Opcode Fuzzy Hash: 8c4360b2d4fdf6338a249d8fb0402a2403643a00b17f231d898364b9cab06533
                                                        • Instruction Fuzzy Hash: 535134B0A003098FDB14DFA9D548B9EBBF1EB88314F248469E019A7361DB749984CF69
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 501 53dd3c5-53dd465 504 53dd49e-53dd4be 501->504 505 53dd467-53dd471 501->505 510 53dd4f7-53dd526 504->510 511 53dd4c0-53dd4ca 504->511 505->504 506 53dd473-53dd475 505->506 508 53dd498-53dd49b 506->508 509 53dd477-53dd481 506->509 508->504 512 53dd485-53dd494 509->512 513 53dd483 509->513 521 53dd55f-53dd619 CreateProcessA 510->521 522 53dd528-53dd532 510->522 511->510 514 53dd4cc-53dd4ce 511->514 512->512 515 53dd496 512->515 513->512 516 53dd4f1-53dd4f4 514->516 517 53dd4d0-53dd4da 514->517 515->508 516->510 519 53dd4dc 517->519 520 53dd4de-53dd4ed 517->520 519->520 520->520 523 53dd4ef 520->523 533 53dd61b-53dd621 521->533 534 53dd622-53dd6a8 521->534 522->521 524 53dd534-53dd536 522->524 523->516 525 53dd559-53dd55c 524->525 526 53dd538-53dd542 524->526 525->521 528 53dd544 526->528 529 53dd546-53dd555 526->529 528->529 529->529 530 53dd557 529->530 530->525 533->534 544 53dd6b8-53dd6bc 534->544 545 53dd6aa-53dd6ae 534->545 547 53dd6cc-53dd6d0 544->547 548 53dd6be-53dd6c2 544->548 545->544 546 53dd6b0 545->546 546->544 550 53dd6e0-53dd6e4 547->550 551 53dd6d2-53dd6d6 547->551 548->547 549 53dd6c4 548->549 549->547 553 53dd6f6-53dd6fd 550->553 554 53dd6e6-53dd6ec 550->554 551->550 552 53dd6d8 551->552 552->550 555 53dd6ff-53dd70e 553->555 556 53dd714 553->556 554->553 555->556 558 53dd715 556->558 558->558
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 053DD606
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 271117c2c8a4a4180a0dec7e0e9cbf69694509199cca8e906bc2c5b11cb118dc
                                                        • Instruction ID: 29f94f8aaec2649c1e93f6052df8faa952303f02f33316cb46df0c5adb43c560
                                                        • Opcode Fuzzy Hash: 271117c2c8a4a4180a0dec7e0e9cbf69694509199cca8e906bc2c5b11cb118dc
                                                        • Instruction Fuzzy Hash: 10A15C72D00219DFDB10CFA8D841BEEFBB2BF48314F1485A9E849A7250DB759985CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 559 53dd3d0-53dd465 561 53dd49e-53dd4be 559->561 562 53dd467-53dd471 559->562 567 53dd4f7-53dd526 561->567 568 53dd4c0-53dd4ca 561->568 562->561 563 53dd473-53dd475 562->563 565 53dd498-53dd49b 563->565 566 53dd477-53dd481 563->566 565->561 569 53dd485-53dd494 566->569 570 53dd483 566->570 578 53dd55f-53dd619 CreateProcessA 567->578 579 53dd528-53dd532 567->579 568->567 571 53dd4cc-53dd4ce 568->571 569->569 572 53dd496 569->572 570->569 573 53dd4f1-53dd4f4 571->573 574 53dd4d0-53dd4da 571->574 572->565 573->567 576 53dd4dc 574->576 577 53dd4de-53dd4ed 574->577 576->577 577->577 580 53dd4ef 577->580 590 53dd61b-53dd621 578->590 591 53dd622-53dd6a8 578->591 579->578 581 53dd534-53dd536 579->581 580->573 582 53dd559-53dd55c 581->582 583 53dd538-53dd542 581->583 582->578 585 53dd544 583->585 586 53dd546-53dd555 583->586 585->586 586->586 587 53dd557 586->587 587->582 590->591 601 53dd6b8-53dd6bc 591->601 602 53dd6aa-53dd6ae 591->602 604 53dd6cc-53dd6d0 601->604 605 53dd6be-53dd6c2 601->605 602->601 603 53dd6b0 602->603 603->601 607 53dd6e0-53dd6e4 604->607 608 53dd6d2-53dd6d6 604->608 605->604 606 53dd6c4 605->606 606->604 610 53dd6f6-53dd6fd 607->610 611 53dd6e6-53dd6ec 607->611 608->607 609 53dd6d8 608->609 609->607 612 53dd6ff-53dd70e 610->612 613 53dd714 610->613 611->610 612->613 615 53dd715 613->615 615->615
                                                        APIs
                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 053DD606
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateProcess
                                                        • String ID:
                                                        • API String ID: 963392458-0
                                                        • Opcode ID: 92d9b24b28b88c16dd576127a0e851c622913ad3ca1dd8d3c7177b40a9cf6d93
                                                        • Instruction ID: 309bb63ee766f4e47f3ffed7141584b00be1200c0972caa609b884be5ed42159
                                                        • Opcode Fuzzy Hash: 92d9b24b28b88c16dd576127a0e851c622913ad3ca1dd8d3c7177b40a9cf6d93
                                                        • Instruction Fuzzy Hash: 02914C71D00219DFDB10CFA8D841BEEFBB2BF48314F1485A9E849A7250DB759985CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 616 a9b55f-a9b57f 617 a9b5ab-a9b5af 616->617 618 a9b581-a9b58e call a98ac0 616->618 619 a9b5b1-a9b5bb 617->619 620 a9b5c3-a9b604 617->620 625 a9b590 618->625 626 a9b5a4 618->626 619->620 627 a9b611-a9b61f 620->627 628 a9b606-a9b60e 620->628 671 a9b596 call a9b7f8 625->671 672 a9b596 call a9b808 625->672 626->617 629 a9b621-a9b626 627->629 630 a9b643-a9b645 627->630 628->627 634 a9b628-a9b62f call a9af54 629->634 635 a9b631 629->635 633 a9b648-a9b64f 630->633 631 a9b59c-a9b59e 631->626 632 a9b6e0-a9b7a0 631->632 666 a9b7a8-a9b7d3 GetModuleHandleW 632->666 667 a9b7a2-a9b7a5 632->667 637 a9b65c-a9b663 633->637 638 a9b651-a9b659 633->638 636 a9b633-a9b641 634->636 635->636 636->633 640 a9b670-a9b679 call a9af64 637->640 641 a9b665-a9b66d 637->641 638->637 647 a9b67b-a9b683 640->647 648 a9b686-a9b68b 640->648 641->640 647->648 649 a9b6a9-a9b6b6 648->649 650 a9b68d-a9b694 648->650 656 a9b6d9-a9b6df 649->656 657 a9b6b8-a9b6d6 649->657 650->649 652 a9b696-a9b6a6 call a9af74 call a9af84 650->652 652->649 657->656 668 a9b7dc-a9b7f0 666->668 669 a9b7d5-a9b7db 666->669 667->666 669->668 671->631 672->631
                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00A9B7C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: 8772fc0615e4387aee1bdaf4b032799da7b455b719102edc30c7a551be7c49f7
                                                        • Instruction ID: dc3f423a0464572ae6e6ab562ca032d4894ec0fbd3af5930ccb8dc0dc45f666b
                                                        • Opcode Fuzzy Hash: 8772fc0615e4387aee1bdaf4b032799da7b455b719102edc30c7a551be7c49f7
                                                        • Instruction Fuzzy Hash: 14815870A00B458FDB24DF29D64479ABBF1FF88300F10892ED08ADBA50D775E949CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 781 a95a84-a95b14
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c3561bb439d2a1379eb923805b4db9415d77221d45537635cb6ba951537e3258
                                                        • Instruction ID: 7485239c81352f30ca900806aa61e2ceb4968445a3488a0eae929758569aedda
                                                        • Opcode Fuzzy Hash: c3561bb439d2a1379eb923805b4db9415d77221d45537635cb6ba951537e3258
                                                        • Instruction Fuzzy Hash: DA41EE71D00A48CEEF12DFB8C84A7EDBBF0AF52314F248189C045AB265C7359946CB45
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 784 a944e4-a959d9 CreateActCtxA 788 a959db-a959e1 784->788 789 a959e2-a95a3c 784->789 788->789 796 a95a4b-a95a4f 789->796 797 a95a3e-a95a41 789->797 798 a95a51-a95a5d 796->798 799 a95a60 796->799 797->796 798->799 801 a95a61 799->801 801->801
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 00A959C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 07692501b50d02245ab103ac4369e0f3d53ba85ba807f5ba2394e40f4fe44ef8
                                                        • Instruction ID: 0176a1b30e506b76ce287de9971efe8c82a18c8fb69aea663e43e68dfc39b7a7
                                                        • Opcode Fuzzy Hash: 07692501b50d02245ab103ac4369e0f3d53ba85ba807f5ba2394e40f4fe44ef8
                                                        • Instruction Fuzzy Hash: E841FFB0D00619CBDF24DFA9C985B8EBBF5BF49304F2080AAD408AB255DB756945CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 802 a9590c-a9598c 803 a9598f-a959d9 CreateActCtxA 802->803 805 a959db-a959e1 803->805 806 a959e2-a95a3c 803->806 805->806 813 a95a4b-a95a4f 806->813 814 a95a3e-a95a41 806->814 815 a95a51-a95a5d 813->815 816 a95a60 813->816 814->813 815->816 818 a95a61 816->818 818->818
                                                        APIs
                                                        • CreateActCtxA.KERNEL32(?), ref: 00A959C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Create
                                                        • String ID:
                                                        • API String ID: 2289755597-0
                                                        • Opcode ID: 2500bbde0b5ef6c01b6c5fed7e43ef3292f9f40dfa30a2face3a4c9168b55f4a
                                                        • Instruction ID: bffe9addf0347faa9509f346fdb6ed61274e0b5e036839356eb96ab180394aca
                                                        • Opcode Fuzzy Hash: 2500bbde0b5ef6c01b6c5fed7e43ef3292f9f40dfa30a2face3a4c9168b55f4a
                                                        • Instruction Fuzzy Hash: 01410FB0C00619CFDF24CFA9C885B8EBBF5BF48304F2080AAD408AB251DBB55946CF94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 819 53dd141-53dd196 822 53dd198-53dd1a4 819->822 823 53dd1a6-53dd1e5 WriteProcessMemory 819->823 822->823 825 53dd1ee-53dd21e 823->825 826 53dd1e7-53dd1ed 823->826 826->825
                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 053DD1D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: d58f2cb3539710c96069e1a0c663b91bb4739d70a20f9c0de1c4085b1c39f4ff
                                                        • Instruction ID: 7e1852bf4bca8c75656c5e7a418a4e2a43a3809545da6a6228f4540f173ce682
                                                        • Opcode Fuzzy Hash: d58f2cb3539710c96069e1a0c663b91bb4739d70a20f9c0de1c4085b1c39f4ff
                                                        • Instruction Fuzzy Hash: F42137B29002599FCB10CFA9D880BDEBBF5FF48310F10882AE959A7240D7789545CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 053DD1D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessWrite
                                                        • String ID:
                                                        • API String ID: 3559483778-0
                                                        • Opcode ID: 14e2bfb3519e4142db89aa401d068117d80c4a97ab5e7a2fa0cc572acf42bb6e
                                                        • Instruction ID: 048a153dea4cfb5a8fe55dee77dd2c61840b431fcc38f77d2a63b946779a41fb
                                                        • Opcode Fuzzy Hash: 14e2bfb3519e4142db89aa401d068117d80c4a97ab5e7a2fa0cc572acf42bb6e
                                                        • Instruction Fuzzy Hash: FC2127B29003599FCB10DFA9C985BDEFBF5FF48310F108829E959A7250C7789944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 053DD2B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: 8fffb3a401db2f9ad9a92b1f2b5ef96018f53530a2b407c2d1268f9c68b68e8b
                                                        • Instruction ID: aa9ee7c80d7d5342ecf59a5be40ff2329bf9ac220fd302f966586af7570ca1d7
                                                        • Opcode Fuzzy Hash: 8fffb3a401db2f9ad9a92b1f2b5ef96018f53530a2b407c2d1268f9c68b68e8b
                                                        • Instruction Fuzzy Hash: CA212AB19003599FCB10DFA9D840AEEFBF5FF48320F10842AE559A7250C7759545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 053DCBF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: db5fa977167ca49365e59d0a4a2663cf211c337e6ccb2d61203a18853869529f
                                                        • Instruction ID: addcf1c8fb27ec25ec7eb0f8448da9f99a2d86a072f6293d04c59e057b5cf181
                                                        • Opcode Fuzzy Hash: db5fa977167ca49365e59d0a4a2663cf211c337e6ccb2d61203a18853869529f
                                                        • Instruction Fuzzy Hash: 522168B29002098FDB10DFAAC4847EEFBF0FF48320F108429D459A7241C778A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 053DD2B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MemoryProcessRead
                                                        • String ID:
                                                        • API String ID: 1726664587-0
                                                        • Opcode ID: f3c7d205f321c0733c53893ccdd61c5c4b8e13d66bde6b27f9fdfac083c44073
                                                        • Instruction ID: 7be530b4bec8d55615bf120fb81f297b233e30b39d580ea9a8809918f8d9ae5d
                                                        • Opcode Fuzzy Hash: f3c7d205f321c0733c53893ccdd61c5c4b8e13d66bde6b27f9fdfac083c44073
                                                        • Instruction Fuzzy Hash: C12128B18002599FCB10DFAAC840ADEFBF5FF48320F108829E559A7250C7749944CBA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 053DCBF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ContextThreadWow64
                                                        • String ID:
                                                        • API String ID: 983334009-0
                                                        • Opcode ID: 48720368c6002716f4fdc3dce96a28d43f928238c88fbfbad87ec29c78eb1f52
                                                        • Instruction ID: 66f0c27afee6ed154bc25c50d1483017aea636dc19e4421486add32ad6da9825
                                                        • Opcode Fuzzy Hash: 48720368c6002716f4fdc3dce96a28d43f928238c88fbfbad87ec29c78eb1f52
                                                        • Instruction Fuzzy Hash: B42138B29002098FDB10DFAAC4857EEFBF4EF48324F108429D459A7241C7789945CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A9DAC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: DuplicateHandle
                                                        • String ID:
                                                        • API String ID: 3793708945-0
                                                        • Opcode ID: 2d8fe383c3332dcce4c865989b533538bab5738c8af7f51db06b9f01c5d68c03
                                                        • Instruction ID: 24651bc1c21c62ab2200c41871d2942307d337b392203612f3c78bb3542dba4c
                                                        • Opcode Fuzzy Hash: 2d8fe383c3332dcce4c865989b533538bab5738c8af7f51db06b9f01c5d68c03
                                                        • Instruction Fuzzy Hash: 3021C4B59002589FDB10CFAAD584ADEFBF4EB48320F14841AE958A7350D374A954CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 053DD0F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 5fcea9be74a5b917128792df9847037f92bcd6ddd4db9688444cffd8804a7fff
                                                        • Instruction ID: 6a71607285b9e5c002958130243889791f9bb761f6719db8d60ffefb3637f200
                                                        • Opcode Fuzzy Hash: 5fcea9be74a5b917128792df9847037f92bcd6ddd4db9688444cffd8804a7fff
                                                        • Instruction Fuzzy Hash: 0E1186B28002489FCB10DFAAC845BEEFFF5EF88324F208819E459A7250C775A544CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A9B841,00000800,00000000,00000000), ref: 00A9BA52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: a96b470561535d5e9cc9731b3652ad8db7492073c6bc56a47dc68ead351e4fd3
                                                        • Instruction ID: e1641580a51ff81cb2df55f4fe938f6dabb30723cc6f3265ce7b82f2f1516bdc
                                                        • Opcode Fuzzy Hash: a96b470561535d5e9cc9731b3652ad8db7492073c6bc56a47dc68ead351e4fd3
                                                        • Instruction Fuzzy Hash: 501112B69003089FCB20CF9AD544ADEFBF4EB48320F10842EE519A7610C3B5A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00A9B841,00000800,00000000,00000000), ref: 00A9BA52
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: 4df2c9e2cec7b4385ea1c18eb6a73cfec52cec362778e9ce58ce32c583ac25ab
                                                        • Instruction ID: cd456b76c20cc39cc9cea3b70f17b2de71313385c20ed35ea38a6bb686437d82
                                                        • Opcode Fuzzy Hash: 4df2c9e2cec7b4385ea1c18eb6a73cfec52cec362778e9ce58ce32c583ac25ab
                                                        • Instruction Fuzzy Hash: D91114B6D002499FDB20CFAAD584ADEFBF4EF48320F10842ED459A7611C775A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 053DD0F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 8293bbac01a90615666e48b64f4034589ab6709e46071229f4bfcb9273d31644
                                                        • Instruction ID: 0df05530cf3e4e5b4a227d95091b6cd37a397fd5538d54bfe8d975ea35dd87ba
                                                        • Opcode Fuzzy Hash: 8293bbac01a90615666e48b64f4034589ab6709e46071229f4bfcb9273d31644
                                                        • Instruction Fuzzy Hash: 2D1126B29002499FCB10DFAAD844BDEFFF5EB88320F208819E559A7250C775A554CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: 3b4756e2792d5993cfaf9e1425d8438b4cb6a4bec727544a17f7df080b08254a
                                                        • Instruction ID: 632d269aeb4178be0c52ef41262b1bc97e1847eb50fc155838c8181b1b13772b
                                                        • Opcode Fuzzy Hash: 3b4756e2792d5993cfaf9e1425d8438b4cb6a4bec727544a17f7df080b08254a
                                                        • Instruction Fuzzy Hash: 92115BB29042498FCB10DFAAD4457DEFFF4EF88324F208829D459A7240C775A945CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 053DFA9D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 7232b3d042f27da7986f27f7c50afec425ea7c1037bc126b0c2a8904720280bf
                                                        • Instruction ID: cc147e88d18e5ae193f506dd10ca7792582f59cd77f05b451abd0151cad3409f
                                                        • Opcode Fuzzy Hash: 7232b3d042f27da7986f27f7c50afec425ea7c1037bc126b0c2a8904720280bf
                                                        • Instruction Fuzzy Hash: 7A11F5B68003499FCB10DF99D985BDEFBF8EB48324F10841AE559A7250C375A984CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: ResumeThread
                                                        • String ID:
                                                        • API String ID: 947044025-0
                                                        • Opcode ID: b311a0f34d02350b4783c4cbcf60f7d0cfbf0fd5995b971c77cbdd6f8ea0d5ea
                                                        • Instruction ID: 631238c1c824a7f4a23526d595bfb202e33ca1caf406dc950f7531d531f7aa16
                                                        • Opcode Fuzzy Hash: b311a0f34d02350b4783c4cbcf60f7d0cfbf0fd5995b971c77cbdd6f8ea0d5ea
                                                        • Instruction Fuzzy Hash: D9113AB29042488FDB10DFAAD4457DEFBF4EB88324F208429D459A7250C775A944CFA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00A9B7C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID:
                                                        • API String ID: 4139908857-0
                                                        • Opcode ID: bf6b0cdeffd1e9fcee6545aefba6c5b358c1eef2dce0d83fad2f5b8f412464fa
                                                        • Instruction ID: 4388897240a9b889cc8a302402d09e78b2f371dd6437f5115432c5ccda31a95a
                                                        • Opcode Fuzzy Hash: bf6b0cdeffd1e9fcee6545aefba6c5b358c1eef2dce0d83fad2f5b8f412464fa
                                                        • Instruction Fuzzy Hash: 21111DB6D002498FCB10CF9AD544ADEFBF8AF88320F10852AD828B7610C379A545CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 053DFA9D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: MessagePost
                                                        • String ID:
                                                        • API String ID: 410705778-0
                                                        • Opcode ID: 299913997bc1bbe7fffde6ee4c6dba58771d0b7ddc0e9dc107b9b88adeaba75d
                                                        • Instruction ID: 34228d2057b69286415885abeda36c0556d4f2dc823c8327c42f1faef24d3217
                                                        • Opcode Fuzzy Hash: 299913997bc1bbe7fffde6ee4c6dba58771d0b7ddc0e9dc107b9b88adeaba75d
                                                        • Instruction Fuzzy Hash: CD1106B6800349DFCB10DF9AD585BDEFBF8EB48314F108459E559A7200C375A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0613635fe41ac44dd6fa57c9c7a9132c8a813f9699b7768e27d91415f442207
                                                        • Instruction ID: 74f83bb625c4c74a2d26e2b81e9207aaee1505713fc5352c0062cc0f3e2aa5ce
                                                        • Opcode Fuzzy Hash: e0613635fe41ac44dd6fa57c9c7a9132c8a813f9699b7768e27d91415f442207
                                                        • Instruction Fuzzy Hash: E2A12570B012049FDB14DBA9D594AAEBBF6AF88704F2044ADE505AB3A1CB71ED45CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0f68d1272affe0a7bd3f640a65b01cc30f5e92cf204d122ee4a97e5b66a9fc4e
                                                        • Instruction ID: c1077ab67b1f2aeb7e192b07fdfde362bb167a397f63d96deea35a7b2623398e
                                                        • Opcode Fuzzy Hash: 0f68d1272affe0a7bd3f640a65b01cc30f5e92cf204d122ee4a97e5b66a9fc4e
                                                        • Instruction Fuzzy Hash: E93177307046118FDB19EB39D55076AB3E2AF85344F68847ED00ACB3A2DF35E806CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1693589580.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a2d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f792785955c983212dacd80b1649cefe3cc5e8df6463e9dd291a31a120d1f65
                                                        • Instruction ID: b9bd1bbf3d547579278914f713e43ad7ee3c9b759b7cc7bcddf1701e6a9f8593
                                                        • Opcode Fuzzy Hash: 1f792785955c983212dacd80b1649cefe3cc5e8df6463e9dd291a31a120d1f65
                                                        • Instruction Fuzzy Hash: F2212571504204DFDB05EF18E9C4B26BF65FB98324F20C579E9094F257C336E856CAA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694386264.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a3d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7deb9460575b9737edb1b8ccbf535f342a1a472debc8fb154161215f5c93dbbf
                                                        • Instruction ID: 30be535d5dd1a982013694b0de865f85c331689fd4119678d48402e941a216a1
                                                        • Opcode Fuzzy Hash: 7deb9460575b9737edb1b8ccbf535f342a1a472debc8fb154161215f5c93dbbf
                                                        • Instruction Fuzzy Hash: 98210471504200EFDB05DF94E9C0B67BBA5FB84314F20C66DF8494B296C736D846CA61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694386264.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a3d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7fc408be0d19f4a16c8ebb86392d9f74ffc324d98a8d4761bb412376cb2feeeb
                                                        • Instruction ID: 498cd484f80f32dd145a323f1faf95b533623326c83e7b309e69c6a320456e51
                                                        • Opcode Fuzzy Hash: 7fc408be0d19f4a16c8ebb86392d9f74ffc324d98a8d4761bb412376cb2feeeb
                                                        • Instruction Fuzzy Hash: D1210471604200DFCB18DF24E9C4B26BFA5FB85B14F20C56DF84A4B296C33AD847CA61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c187488851f36905853cf55d549c32810bc0d7f478042f341bcbd2e604a92fae
                                                        • Instruction ID: f5b0e6d18f10b360eedd3eb7b3474f267ac057a6e6c5a2e4bf1073f65091bca5
                                                        • Opcode Fuzzy Hash: c187488851f36905853cf55d549c32810bc0d7f478042f341bcbd2e604a92fae
                                                        • Instruction Fuzzy Hash: 612138307006118FDB29AB39D51476AB3E6EF89354F64447DE109CB3A2DF35E805CB55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 36b6dac11ca89bee95ccb1ead088d2a3371920f76d7a07f668f15e0a4707c8c1
                                                        • Instruction ID: 43e4227827cc7d70546a23ee1ae69c05f8211c05244218d92055552db5948ab0
                                                        • Opcode Fuzzy Hash: 36b6dac11ca89bee95ccb1ead088d2a3371920f76d7a07f668f15e0a4707c8c1
                                                        • Instruction Fuzzy Hash: C82168307006118FCB29AB39D5547AAB3E6EF89344F64447DE00ACB3A2DF35D806CB55
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8d8bb769e563b8455a3b2a24b3abc0d2edde8959245eac2d86ce6adfc2476ea3
                                                        • Instruction ID: 4b3dd2da0b637e31c403b78414dba78436d871cb6cbb8cbde877f9faddcc27b8
                                                        • Opcode Fuzzy Hash: 8d8bb769e563b8455a3b2a24b3abc0d2edde8959245eac2d86ce6adfc2476ea3
                                                        • Instruction Fuzzy Hash: 34217974E04259DFDB01DFB4D844BFEBFB0AB4A301F2844AAE464A3291C3748A54DF50
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 94a06e812bddb67fdbd1a5adc3638951ed59a16176f556da50d8a712650817be
                                                        • Instruction ID: 0e37801e8205da1c85667050ed225d695c529509ba7bc10488065a3f814dfbe1
                                                        • Opcode Fuzzy Hash: 94a06e812bddb67fdbd1a5adc3638951ed59a16176f556da50d8a712650817be
                                                        • Instruction Fuzzy Hash: D8119E35A093948FCB13DB74E858AD9BFB2AF47300B5580EAE848DB162D7319829CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1693589580.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a2d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction ID: 02b0990f622367f8e652b226477188443be467b8c08a69ee7e2c996b3b525606
                                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                        • Instruction Fuzzy Hash: 5C11E172404280CFDB06DF04D9C4B16BF72FB94324F24C2A9D8090B257C33AE85ACBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694386264.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a3d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction ID: 29d41dc3b33d0dcef10d9f45808cd5ff7f8733fb703590a3149ef6c763cb72af
                                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction Fuzzy Hash: 8F11D075504280CFCB15CF14E5C4B15FF61FB45714F24C6AAE84A4B656C33AD80ACB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694386264.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a3d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction ID: 1dc9125a05ffa4ed38b8061e66915995601bc99b4974f2a6e764415eca1cfd79
                                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                        • Instruction Fuzzy Hash: E711BB75504280DFCB02CF50D5C4B56BBA1FB84314F24C6AAE8494B296C33AD80ACB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 49282ca182f56e49cbc8d4c86d04510f3dd27c7a57fe4403ac22b0318db8394b
                                                        • Instruction ID: 8284edfa0445d2e38d8ae4e8d9f1bac58c7c2619920a9f5e59ea119db28f1150
                                                        • Opcode Fuzzy Hash: 49282ca182f56e49cbc8d4c86d04510f3dd27c7a57fe4403ac22b0318db8394b
                                                        • Instruction Fuzzy Hash: 58113C357443008FCB25EB39D08589ABBE2AF8631431589AED59ACB765DF71E906CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 37e7a11e3ddf59b239c239736c855d2bcd1e3e9784db217633a0fd770c3e23a7
                                                        • Instruction ID: de5e73b22e1aabbd45fd69e7b3fb66cb2f294f2f42e61a610508860e3eb8fc3c
                                                        • Opcode Fuzzy Hash: 37e7a11e3ddf59b239c239736c855d2bcd1e3e9784db217633a0fd770c3e23a7
                                                        • Instruction Fuzzy Hash: BE115B317006008FC721DF39C54499BBBE5AF8630471989AEE15ACB721DB70ED058B90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1693589580.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a2d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 282651b9e749603d468179cbda2e66e57aa4a1d01d0a18b690c6a3bbd61ed9a7
                                                        • Instruction ID: c0d59ee9ecf3133231067c78a26ab36010c47c37c4e630c8648869e68c8e5f23
                                                        • Opcode Fuzzy Hash: 282651b9e749603d468179cbda2e66e57aa4a1d01d0a18b690c6a3bbd61ed9a7
                                                        • Instruction Fuzzy Hash: 5301A2714083509AE7109F2DEE84B67BFA8EF51324F18C93AED094E287D67D9840CAB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b439f5d965d0e36c5aec05036eca4967a99f7b240c5ab881fb81e5186a7f32ad
                                                        • Instruction ID: 1f78ea8c52631f57f9d04816bf6751898e6c2e72d57006f4ec38de081f92fd8a
                                                        • Opcode Fuzzy Hash: b439f5d965d0e36c5aec05036eca4967a99f7b240c5ab881fb81e5186a7f32ad
                                                        • Instruction Fuzzy Hash: 4E0144763006008F8720EB3AD90499BB7EAAF8671471589ADE15ACB720EB70ED058BD0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8b6d7f0867e2f136f6e2a54326263b147fe164b6f4992dfc9233c27bca0b7554
                                                        • Instruction ID: d40e63d4218d7fb4427afdc91613da3bafd05dec5c7dae7fb61ee07d74a2c731
                                                        • Opcode Fuzzy Hash: 8b6d7f0867e2f136f6e2a54326263b147fe164b6f4992dfc9233c27bca0b7554
                                                        • Instruction Fuzzy Hash: 8D011A74D04219DFCB04DFB5D808BFEBBF0BB4A301F1484A9A425A3291D7744A40DF54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1693589580.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a2d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5f80c3daabe512132f0f766718e7c1d27c6a41d806b7979f6b5d99ae44df2ace
                                                        • Instruction ID: 5fa521b1aaf2d56fedfafa976bb4ce2eb43af0ae669626d33e36a950048d65f0
                                                        • Opcode Fuzzy Hash: 5f80c3daabe512132f0f766718e7c1d27c6a41d806b7979f6b5d99ae44df2ace
                                                        • Instruction Fuzzy Hash: FBF062714083549EE7148F1AD888B66FFA8EF51734F18C45AED484F287C2799844CBB1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 94bc759bca6a755793c703b363b3f8e76e99fb63e73c82da9014c8844a7c7f15
                                                        • Instruction ID: 7c55bed81481b1cb5fe1b332ee03f72c4691fe955503baab58d0cf88e7e449f7
                                                        • Opcode Fuzzy Hash: 94bc759bca6a755793c703b363b3f8e76e99fb63e73c82da9014c8844a7c7f15
                                                        • Instruction Fuzzy Hash: 4B0169B0A18346DFD715CF78C484AAEBFF0AF0A314F21469EE150DB292D7759145CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b3b48bdabca96d991d2fc6494b8e8f0f5d1f18cc9f218097db8b8653d98d39fa
                                                        • Instruction ID: 84387e207949290b3ac94b2512ac2ec01cbdbca117efb72140e669dbe4b5aab4
                                                        • Opcode Fuzzy Hash: b3b48bdabca96d991d2fc6494b8e8f0f5d1f18cc9f218097db8b8653d98d39fa
                                                        • Instruction Fuzzy Hash: 8AF06DB0D0425A9EDB20DF79C8847ABBFF0AF09304F24496DD849E7641D7B55501CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f62b0a01cc95f6b54e80eeac5a460d1fb99419aaa6df2d9df25120ed70114812
                                                        • Instruction ID: e5f6abb239e136ed4756a53441e485beceef53ad92194ac56bb791dd3ebf8af3
                                                        • Opcode Fuzzy Hash: f62b0a01cc95f6b54e80eeac5a460d1fb99419aaa6df2d9df25120ed70114812
                                                        • Instruction Fuzzy Hash: 5FF0DAB0D0420ADFDB44DFA9C845AAEBBF4AB48300F1045AEE918E7241D77096408FD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 83f51890c51034e63fa0146726114389635d83ee95b139609fe12dee860fbb9c
                                                        • Instruction ID: af6c1b5dc065632f5c878536704b447127b153f7b73c26a6e92d83fe3075e913
                                                        • Opcode Fuzzy Hash: 83f51890c51034e63fa0146726114389635d83ee95b139609fe12dee860fbb9c
                                                        • Instruction Fuzzy Hash: E9E0A5B0D0021A9FD760EF6A894576BBAF4AF48750F64892D9409E6211EBB096008BA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 19ad9c118e1e4032a728cf24f0b8272b532ac8384ae930049b9f649b4be525e3
                                                        • Instruction ID: b1708679f3af49b1a6a47aec91fc5feab4de747974f7ea1683478c5fba696499
                                                        • Opcode Fuzzy Hash: 19ad9c118e1e4032a728cf24f0b8272b532ac8384ae930049b9f649b4be525e3
                                                        • Instruction Fuzzy Hash: 3EE065B0A94645DFD710EB34D40854EBFB15B05314F25C5DDD161DB1A2D7B445058F80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 97699d74775efcce619913a4b05c26a2aee47c259cc4967fb140a8348ad46b07
                                                        • Instruction ID: 08bfa6ca8f7a8857a019c8261b1ebf8058815a19d13823c7a8bd3475f6377de8
                                                        • Opcode Fuzzy Hash: 97699d74775efcce619913a4b05c26a2aee47c259cc4967fb140a8348ad46b07
                                                        • Instruction Fuzzy Hash: 8DE052B0DA021ADFE750DF69C544AAABBF0AB08700F20896DD029E7211D77496018F84
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0b840710d277c0a8cb4fe73725c67e219a3553be0db2141a1c0181c0304c94ed
                                                        • Instruction ID: 5f9cba2d03b9c9045a2d5d629ad673a170223bf476f97c5ca08df9ae79a4b933
                                                        • Opcode Fuzzy Hash: 0b840710d277c0a8cb4fe73725c67e219a3553be0db2141a1c0181c0304c94ed
                                                        • Instruction Fuzzy Hash: 32E092B0D9021ADFD740EFB9C905A5EBBF0BB08700F2185A9D019E7251E77496058F91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9f33688e35655ac6d1e6e592bd024a0abaccddbf80398c0ea685feb858bbb434
                                                        • Instruction ID: cd70b336eb1b2f331eb9ae95e5a9092962375d74dcec3af79e8f06f736e62789
                                                        • Opcode Fuzzy Hash: 9f33688e35655ac6d1e6e592bd024a0abaccddbf80398c0ea685feb858bbb434
                                                        • Instruction Fuzzy Hash: 62C0022A01F3C24EC703CB2589A05917F75BD5766839905C2D190CB693D614992ADB26
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 38b339f1be6468f398504b1148b3ba2b2193d326fceec8c01d9983e4f9843642
                                                        • Instruction ID: 449d478a0c2ed7aa70373741dfa7b6be90b67f1f09739a2aee13e539e883af57
                                                        • Opcode Fuzzy Hash: 38b339f1be6468f398504b1148b3ba2b2193d326fceec8c01d9983e4f9843642
                                                        • Instruction Fuzzy Hash: 7FE02DB4D4421AEFEB50EFB89545BAEBBF0AB08710F60896EC415E6241E7B446448F91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 46e20401eebf80dea34b70a3f707a4eba90ac315de267596484a62014397d7a6
                                                        • Instruction ID: a1948310c3ba435c446f7464abb0863bb93ea00d0c2f5a79c0369222e2683fcd
                                                        • Opcode Fuzzy Hash: 46e20401eebf80dea34b70a3f707a4eba90ac315de267596484a62014397d7a6
                                                        • Instruction Fuzzy Hash: 03D042B4D4431AEFDB50EFB9950579EBBF4AB04700F60896EC415E6241E7B446448FA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aa122290503d81afc05e1169add061c73908b497732e5aa44d72d1b772976dc7
                                                        • Instruction ID: 0ecdfad55ba064634423a8185cfd78c380320d9ea5622a36b30313357a870418
                                                        • Opcode Fuzzy Hash: aa122290503d81afc05e1169add061c73908b497732e5aa44d72d1b772976dc7
                                                        • Instruction Fuzzy Hash: 03D0123622420C9F4B81EFA4E800E9677DDBB65700B01842AF508C7431E721E464DB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1695601297.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_27c0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ec033338cf11afb0ba9e2856e4b1ab1a6b6cd4a8f37dcb7c2f520e6692cc52ca
                                                        • Instruction ID: e96ef02baa448730fc57e2c7e57276a2169914e31876312aaa8867be8d82dd94
                                                        • Opcode Fuzzy Hash: ec033338cf11afb0ba9e2856e4b1ab1a6b6cd4a8f37dcb7c2f520e6692cc52ca
                                                        • Instruction Fuzzy Hash: 20C08C313082088BCB48FF31904612D339BABC11093D4C079984E8B358EE39D803C745
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: T+-q$[V~*$[V~*$]\`
                                                        • API String ID: 0-1849991408
                                                        • Opcode ID: 7e6e7723abca505490ef756a7f724d24136df9433c1f9457294a30734b3b8086
                                                        • Instruction ID: 18b3ac8fa0ac7e6eee7d3babdfd41b28ba0d8205d783a841cab8e92cd786fa9e
                                                        • Opcode Fuzzy Hash: 7e6e7723abca505490ef756a7f724d24136df9433c1f9457294a30734b3b8086
                                                        • Instruction Fuzzy Hash: D5B12671E1521ADBDB05CFAAE98089EFBF2FF89300F14D92AD415BB218D73099058F65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: T+-q$[V~*$]\`
                                                        • API String ID: 0-3978741314
                                                        • Opcode ID: 559e28304809c47ed1067e7196eb0b8913ad6dbe579385573cce28d8c255826c
                                                        • Instruction ID: 478190a0ec04ca518347766d3b533e58e8172d2163be8a89194800ec8a4fa30c
                                                        • Opcode Fuzzy Hash: 559e28304809c47ed1067e7196eb0b8913ad6dbe579385573cce28d8c255826c
                                                        • Instruction Fuzzy Hash: 48B13471E1521ADFDB05CFAAE98089EFBF2FF89300B14D92AD415BB218D73099058F65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e40a340a22f096e13699bc2415bcd6e84bb56104f9fc250e923b3a699d2d2372
                                                        • Instruction ID: 5eeac15f01a6e26a0a78e8e7557d48b1e2610b4dea1a61a01f15ba5c7e512c36
                                                        • Opcode Fuzzy Hash: e40a340a22f096e13699bc2415bcd6e84bb56104f9fc250e923b3a699d2d2372
                                                        • Instruction Fuzzy Hash: CFE11B74E042198FCB14DFA9D6809AEFBB2FF89304F248169D415AB356DB30AD42CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 00a55392a812a0a2c1166ce1aff8b052fe36010597f38aabbe6498b36f68fea2
                                                        • Instruction ID: 42b84175263fd3fb8667e0967ea352dcfe71b72d7711f606a783a90c3a22f767
                                                        • Opcode Fuzzy Hash: 00a55392a812a0a2c1166ce1aff8b052fe36010597f38aabbe6498b36f68fea2
                                                        • Instruction Fuzzy Hash: BEE11A75E042198FCB14DFA9D6809AEFBF2BF89304F248169E414AB355DB31AD42CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 161f347098a1a3944fdc8a8992a42fbce0b2a6044b530bd56e605f2702f1a6aa
                                                        • Instruction ID: 79b00c6fc2b2c334ebdfa7dcdb66b1b329331d7eb90e3e6945459ed48431bf54
                                                        • Opcode Fuzzy Hash: 161f347098a1a3944fdc8a8992a42fbce0b2a6044b530bd56e605f2702f1a6aa
                                                        • Instruction Fuzzy Hash: D2E12B74E142198FCB14DFA9D5809AEFBB2FF88304F249169E414AB356DB31AD42CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f1bb7485426be7354092be5f8ce9b5dfc240473eeae22767288727d121d5b3b
                                                        • Instruction ID: 0dd74c8b58c4f0451e2aae48bb5548c3c8a1f977902eee45ef7c8fe5a80dc1fe
                                                        • Opcode Fuzzy Hash: 8f1bb7485426be7354092be5f8ce9b5dfc240473eeae22767288727d121d5b3b
                                                        • Instruction Fuzzy Hash: F7E11AB4E142198FCB14DF99D5809AEFBF2BF89304F249169D414AB356DB30AD42CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ac21be622102b31a1827d49da73a589f12b83bb5eded7ced50867b1e31e97460
                                                        • Instruction ID: f6f2e053410377c6e930b639cb82e2f9c275995d71286168ba57bb57d808c689
                                                        • Opcode Fuzzy Hash: ac21be622102b31a1827d49da73a589f12b83bb5eded7ced50867b1e31e97460
                                                        • Instruction Fuzzy Hash: DFE12B75E042198FCB14DFA9D6809AEFBF2BF89304F249169E404AB355DB30AD42CF61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a8b87f0517bbe4a0d8071f8e91458ca90f544edeb4fb9b282a90bc6ffa1b8380
                                                        • Instruction ID: b4030b44be31a5b5feaed29a6485109620938479c3d40435cdb4b60214b923c8
                                                        • Opcode Fuzzy Hash: a8b87f0517bbe4a0d8071f8e91458ca90f544edeb4fb9b282a90bc6ffa1b8380
                                                        • Instruction Fuzzy Hash: 07D1D631D1475A9ACB11EFA4D990A9DB7B1FF96300F10C7AAE0093B215FB706AC5CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1694713219.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_a90000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 10957aa34fed6b9b81063cb2f439b71c18af756e6e26612d359129a3c21ede69
                                                        • Instruction ID: 5f7a55b02807a930059a9cf89eedca2fc4499e43b5c8ebaa56ec9fdefba77c54
                                                        • Opcode Fuzzy Hash: 10957aa34fed6b9b81063cb2f439b71c18af756e6e26612d359129a3c21ede69
                                                        • Instruction Fuzzy Hash: EBA14B36F002199FCF05DFA4C94459EB7F2FF89300B15857AE806AB266DB31E956CB80
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 28b5bbc6e2a83f42aed5b8f592941f28e9b07e4ff9ea4d579d91d1fd4328ff51
                                                        • Instruction ID: 5cb0d0de1994e9c67a01db0adfde7d72d0fcba193489fe91a9a4394bb5d0cd8e
                                                        • Opcode Fuzzy Hash: 28b5bbc6e2a83f42aed5b8f592941f28e9b07e4ff9ea4d579d91d1fd4328ff51
                                                        • Instruction Fuzzy Hash: FFD1D631D1475A9ACB11EBA4D950A9DB7B1FF96300F10C7AAE0093B215FB706AC5CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c408117840421169efef99e460f2b41dad0e8b580a4da9fc1d78d01c3478472
                                                        • Instruction ID: 4bc2eaaa70a5e560cf55dd17b8f88dae0ade9075fcebaf73f14d1d8dd8d8c51a
                                                        • Opcode Fuzzy Hash: 6c408117840421169efef99e460f2b41dad0e8b580a4da9fc1d78d01c3478472
                                                        • Instruction Fuzzy Hash: 2DD1D731D1475A9ACB11EFA4D990A9DB7B1FF96300F10C7AAE0093B215FB706AC5CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 311b902a1b3e705494889f66a648535fd667169382527b74df74dcadd1341d23
                                                        • Instruction ID: 3671e7ef8e0c1601250cbcbf34029bf75ca7ebb23b9277204734886da83625df
                                                        • Opcode Fuzzy Hash: 311b902a1b3e705494889f66a648535fd667169382527b74df74dcadd1341d23
                                                        • Instruction Fuzzy Hash: 31514C71E056099FDB08CFA6E5456AEFBF2FF88310F10942AD415E7364E7745A418FA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 9fad39ee14814f78409d7c73722c6a1facffc7e523b9d22eec52ef429781fa1b
                                                        • Instruction ID: ba8f88a1dfdcd57563673cf6dc27ca1d06c37747d6c54e579beb32dc200ec1a0
                                                        • Opcode Fuzzy Hash: 9fad39ee14814f78409d7c73722c6a1facffc7e523b9d22eec52ef429781fa1b
                                                        • Instruction Fuzzy Hash: A6513771E0620A9FDB08CFA6E5495AEFBF2FB88310F10942AD415F7364E7745A018FA0
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b3a1f226290961fe875e7216e8bd8c5e7063879de29ef330edf80502a1a5216b
                                                        • Instruction ID: c280d1c1f4b223da666b7fc27cd0cfe93d1cd45237910c594dceaff282e295ae
                                                        • Opcode Fuzzy Hash: b3a1f226290961fe875e7216e8bd8c5e7063879de29ef330edf80502a1a5216b
                                                        • Instruction Fuzzy Hash: 93512B71E142198FCB14CFA9D5805AEFBF2BF89304F24916AD418AB316DB319D42CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1700950191.00000000053D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053D0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_53d0000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c1292638e7d791794e1cd22498680f4f72c06b9cf5f606a6cbc209ece0eb2ea
                                                        • Instruction ID: 0ce9d31bdaf396388f723c7cb31d034bbdcb383ec3c6681f1dcd7f379bb00e91
                                                        • Opcode Fuzzy Hash: 6c1292638e7d791794e1cd22498680f4f72c06b9cf5f606a6cbc209ece0eb2ea
                                                        • Instruction Fuzzy Hash: AD514E71E052198FCB14DFA9D5805AEFBF2BF89314F24C169D418AB315DB305942CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Execution Graph

                                                        Execution Coverage:10.4%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:0%
                                                        Total number of Nodes:75
                                                        Total number of Limit Nodes:7
                                                        execution_graph 38577 c5d044 38578 c5d05c 38577->38578 38579 c5d0b6 38578->38579 38584 676d9b7 38578->38584 38588 676d9c8 38578->38588 38592 676e718 38578->38592 38601 676cc44 38578->38601 38585 676d9c5 38584->38585 38586 676cc44 CallWindowProcW 38585->38586 38587 676da0f 38586->38587 38587->38579 38589 676d9ee 38588->38589 38590 676cc44 CallWindowProcW 38589->38590 38591 676da0f 38590->38591 38591->38579 38595 676e755 38592->38595 38593 676e789 38626 676cd6c 38593->38626 38595->38593 38596 676e779 38595->38596 38610 676e8b0 38596->38610 38615 676e97c 38596->38615 38621 676e8a0 38596->38621 38597 676e787 38597->38597 38602 676cc4f 38601->38602 38603 676e789 38602->38603 38605 676e779 38602->38605 38604 676cd6c CallWindowProcW 38603->38604 38606 676e787 38604->38606 38607 676e8b0 CallWindowProcW 38605->38607 38608 676e8a0 CallWindowProcW 38605->38608 38609 676e97c CallWindowProcW 38605->38609 38606->38606 38607->38606 38608->38606 38609->38606 38612 676e8c4 38610->38612 38611 676e950 38611->38597 38630 676e968 38612->38630 38633 676e958 38612->38633 38616 676e93a 38615->38616 38617 676e98a 38615->38617 38619 676e968 CallWindowProcW 38616->38619 38620 676e958 CallWindowProcW 38616->38620 38618 676e950 38618->38597 38619->38618 38620->38618 38622 676e8b1 38621->38622 38624 676e968 CallWindowProcW 38622->38624 38625 676e958 CallWindowProcW 38622->38625 38623 676e950 38623->38597 38624->38623 38625->38623 38627 676cd77 38626->38627 38628 676fe19 38627->38628 38629 676fe6a CallWindowProcW 38627->38629 38628->38597 38629->38628 38631 676e979 38630->38631 38637 676fd90 38630->38637 38631->38611 38634 676e968 38633->38634 38635 676e979 38634->38635 38636 676fd90 CallWindowProcW 38634->38636 38635->38611 38636->38635 38638 676cd6c CallWindowProcW 38637->38638 38639 676fdba 38638->38639 38639->38631 38640 676d810 38641 676d878 CreateWindowExW 38640->38641 38643 676d934 38641->38643 38644 e20848 38645 e2084e 38644->38645 38646 e2091b 38645->38646 38648 e21380 38645->38648 38649 e21375 38648->38649 38651 e2138f 38648->38651 38649->38645 38650 e21480 38650->38645 38651->38650 38653 e27eb0 38651->38653 38654 e27eba 38653->38654 38655 e27ed4 38654->38655 38658 661da20 38654->38658 38663 661da30 38654->38663 38655->38651 38660 661da45 38658->38660 38659 661dc5a 38659->38655 38660->38659 38661 661dc71 GlobalMemoryStatusEx 38660->38661 38662 661decc GlobalMemoryStatusEx 38660->38662 38661->38660 38662->38660 38665 661da45 38663->38665 38664 661dc5a 38664->38655 38665->38664 38666 661dc71 GlobalMemoryStatusEx 38665->38666 38667 661decc GlobalMemoryStatusEx 38665->38667 38666->38665 38667->38665
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c4795e865fe5759fc15b54d8c617df5779de3fe707c122323b211c8b3f5ca31c
                                                        • Instruction ID: d38197527ad0ecf4e0fca9b85f81e58fbd59be88f68873c582b463ea750c9ecb
                                                        • Opcode Fuzzy Hash: c4795e865fe5759fc15b54d8c617df5779de3fe707c122323b211c8b3f5ca31c
                                                        • Instruction Fuzzy Hash: D053F831C14B1A8ACB51EF68C880599F7B1FF99300F15D79AE4587B225FB70AAC5CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb23d859ace250463ccf26aef6a2b044f3e264e261558ff1835b7c64a46dc087
                                                        • Instruction ID: d27fc47a014c502fc4fddbc608ace5a7dd09b49135156234e89b1d6dc88e1ecf
                                                        • Opcode Fuzzy Hash: fb23d859ace250463ccf26aef6a2b044f3e264e261558ff1835b7c64a46dc087
                                                        • Instruction Fuzzy Hash: 92332D31D10B198EDB11EF68C8806ADF7B1FF99300F15D69AE459B7211EB70AAC5CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vl
                                                        • API String ID: 0-682378881
                                                        • Opcode ID: 3d86a18abd2999ad6cd4311f2c3d797c3cf5fc5dbcff9dc53ce9d0794ba4ca7e
                                                        • Instruction ID: 77a8ac018898866a62e57766d1098afcb746e1147521d34507230fa10f905757
                                                        • Opcode Fuzzy Hash: 3d86a18abd2999ad6cd4311f2c3d797c3cf5fc5dbcff9dc53ce9d0794ba4ca7e
                                                        • Instruction Fuzzy Hash: 00915FB0E002198FDF10CFA9E9857DDBBF2AF88318F149129E415B7294EB749995CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: abb11cbd81f93f20399cfe1f37361c27f825fa471d32ffb2f37a583be1d250b3
                                                        • Instruction ID: 480823589b14ea4c5c18c0e568db5a3fc3e3a3fcef2c1e0c49fe08f2599d8a27
                                                        • Opcode Fuzzy Hash: abb11cbd81f93f20399cfe1f37361c27f825fa471d32ffb2f37a583be1d250b3
                                                        • Instruction Fuzzy Hash: FFB141B1E002198FDF10CFA9E8957DDBBF2AF88318F249529D815F7294EB749845CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1629 e24810-e2489c 1632 e248e6-e248e8 1629->1632 1633 e2489e-e248a9 1629->1633 1634 e248ea-e24902 1632->1634 1633->1632 1635 e248ab-e248b7 1633->1635 1642 e24904-e2490f 1634->1642 1643 e2494c-e2494e 1634->1643 1636 e248da-e248e4 1635->1636 1637 e248b9-e248c3 1635->1637 1636->1634 1638 e248c7-e248d6 1637->1638 1639 e248c5 1637->1639 1638->1638 1641 e248d8 1638->1641 1639->1638 1641->1636 1642->1643 1644 e24911-e2491d 1642->1644 1645 e24950-e249a9 1643->1645 1646 e24940-e2494a 1644->1646 1647 e2491f-e24929 1644->1647 1654 e249b2-e249d2 1645->1654 1655 e249ab-e249b1 1645->1655 1646->1645 1649 e2492b 1647->1649 1650 e2492d-e2493c 1647->1650 1649->1650 1650->1650 1651 e2493e 1650->1651 1651->1646 1659 e249dc-e24a0f 1654->1659 1655->1654 1662 e24a11-e24a15 1659->1662 1663 e24a1f-e24a23 1659->1663 1662->1663 1664 e24a17-e24a1a call e20ab8 1662->1664 1665 e24a33-e24a37 1663->1665 1666 e24a25-e24a29 1663->1666 1664->1663 1669 e24a47-e24a4b 1665->1669 1670 e24a39-e24a3d 1665->1670 1666->1665 1668 e24a2b-e24a2e call e20ab8 1666->1668 1668->1665 1673 e24a5b 1669->1673 1674 e24a4d-e24a51 1669->1674 1670->1669 1672 e24a3f 1670->1672 1672->1669 1676 e24a5c 1673->1676 1674->1673 1675 e24a53 1674->1675 1675->1673 1676->1676
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vl$\Vl
                                                        • API String ID: 0-415357090
                                                        • Opcode ID: 133c66a0bedc3eb840343d1bb3b1fae176de6bd7d32fb0a801968145b95004fe
                                                        • Instruction ID: b35a75b039d5f8f11b5f8d447df4635957d18d93d1d95bf00ba64e0c2b17d062
                                                        • Opcode Fuzzy Hash: 133c66a0bedc3eb840343d1bb3b1fae176de6bd7d32fb0a801968145b95004fe
                                                        • Instruction Fuzzy Hash: 78717CF0E00259CFDB14CFA9E8817DEBBF2AF88314F149129E415B7294EB749885CB95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1677 e24804-e2489c 1680 e248e6-e248e8 1677->1680 1681 e2489e-e248a9 1677->1681 1682 e248ea-e24902 1680->1682 1681->1680 1683 e248ab-e248b7 1681->1683 1690 e24904-e2490f 1682->1690 1691 e2494c-e2494e 1682->1691 1684 e248da-e248e4 1683->1684 1685 e248b9-e248c3 1683->1685 1684->1682 1686 e248c7-e248d6 1685->1686 1687 e248c5 1685->1687 1686->1686 1689 e248d8 1686->1689 1687->1686 1689->1684 1690->1691 1692 e24911-e2491d 1690->1692 1693 e24950-e24962 1691->1693 1694 e24940-e2494a 1692->1694 1695 e2491f-e24929 1692->1695 1700 e24969-e24995 1693->1700 1694->1693 1697 e2492b 1695->1697 1698 e2492d-e2493c 1695->1698 1697->1698 1698->1698 1699 e2493e 1698->1699 1699->1694 1701 e2499b-e249a9 1700->1701 1702 e249b2-e249c0 1701->1702 1703 e249ab-e249b1 1701->1703 1706 e249c8-e249d2 1702->1706 1703->1702 1707 e249dc-e24a0f 1706->1707 1710 e24a11-e24a15 1707->1710 1711 e24a1f-e24a23 1707->1711 1710->1711 1712 e24a17-e24a1a call e20ab8 1710->1712 1713 e24a33-e24a37 1711->1713 1714 e24a25-e24a29 1711->1714 1712->1711 1717 e24a47-e24a4b 1713->1717 1718 e24a39-e24a3d 1713->1718 1714->1713 1716 e24a2b-e24a2e call e20ab8 1714->1716 1716->1713 1721 e24a5b 1717->1721 1722 e24a4d-e24a51 1717->1722 1718->1717 1720 e24a3f 1718->1720 1720->1717 1724 e24a5c 1721->1724 1722->1721 1723 e24a53 1722->1723 1723->1721 1724->1724
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vl$\Vl
                                                        • API String ID: 0-415357090
                                                        • Opcode ID: cff7167732d1635159c40d6969c9be0a6448c304120ff391cec80cc290404b5c
                                                        • Instruction ID: 56d1474c1805f3945b0f36688b2258478964c130374c9b9d521fedd828955359
                                                        • Opcode Fuzzy Hash: cff7167732d1635159c40d6969c9be0a6448c304120ff391cec80cc290404b5c
                                                        • Instruction Fuzzy Hash: DF717CB0E00259CFDF14CFA8E8817DEBBF1AF88314F149129E415B7294EB749885CB95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2275 661e991-661e9ab 2276 661e9d5-661e9f4 call 661e108 2275->2276 2277 661e9ad-661e9d4 call 661d210 2275->2277 2283 661e9f6-661e9f9 2276->2283 2284 661e9fa-661ea59 2276->2284 2291 661ea5b-661ea5e 2284->2291 2292 661ea5f-661eaec GlobalMemoryStatusEx 2284->2292 2296 661eaf5-661eb1d 2292->2296 2297 661eaee-661eaf4 2292->2297 2297->2296
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885707053.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6610000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 71b0928e977b05605811a7190ed1e894d9fca040285643da753c8f5597c16f7e
                                                        • Instruction ID: b2f55d0fe7df3664b5cf2dac6479a71cc10be1d1a7a7e4bad0019786618674d6
                                                        • Opcode Fuzzy Hash: 71b0928e977b05605811a7190ed1e894d9fca040285643da753c8f5597c16f7e
                                                        • Instruction Fuzzy Hash: AC412271D003598FCB10DFA9D8446EEBBF5EF89210F14856AE908AB341DB789841CBE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2300 676d804-676d876 2302 676d881-676d888 2300->2302 2303 676d878-676d87e 2300->2303 2304 676d893-676d8cb 2302->2304 2305 676d88a-676d890 2302->2305 2303->2302 2306 676d8d3-676d932 CreateWindowExW 2304->2306 2305->2304 2307 676d934-676d93a 2306->2307 2308 676d93b-676d973 2306->2308 2307->2308 2312 676d975-676d978 2308->2312 2313 676d980 2308->2313 2312->2313 2314 676d981 2313->2314 2314->2314
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0676D922
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885920332.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6760000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: 933f5440dd5fafc6e7c17269b8e3fc3b63fabb84439cefe31931f28b09991f83
                                                        • Instruction ID: 8d42666c164ebcd67d6693316536660494b5e1c6e012357733620ee9a76a588b
                                                        • Opcode Fuzzy Hash: 933f5440dd5fafc6e7c17269b8e3fc3b63fabb84439cefe31931f28b09991f83
                                                        • Instruction Fuzzy Hash: 7651C2B1D103499FDB24CF9AC884ADEFBB6FF48314F24852AE818AB210D7759845CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0676D922
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885920332.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6760000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: b3987f437f8bcf47c631bbbb5886badefa267f380d7d01f3c1f22cfd45a91000
                                                        • Instruction ID: b135c1423c9271185867be71ba15ae875c7068de2a3541f3f322aeaba13160d0
                                                        • Opcode Fuzzy Hash: b3987f437f8bcf47c631bbbb5886badefa267f380d7d01f3c1f22cfd45a91000
                                                        • Instruction Fuzzy Hash: ED41B0B1D103499FDB24CF9AC884ADEBBB6FF48314F24852AE818AB210D7759845CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 0676FE91
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885920332.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6760000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: CallProcWindow
                                                        • String ID:
                                                        • API String ID: 2714655100-0
                                                        • Opcode ID: 27ea82ac70be347a2479c1869a36a514cf485d170f90a0c4f5d8eb5266c0eaf2
                                                        • Instruction ID: 060289c6fd604964c334eefc4b64f8d77eb251d54956d504984c75cea0a63065
                                                        • Opcode Fuzzy Hash: 27ea82ac70be347a2479c1869a36a514cf485d170f90a0c4f5d8eb5266c0eaf2
                                                        • Instruction Fuzzy Hash: BB412CB4900309CFDB54CF9AD448AAABBF6FF88314F24C459E519AB321D774A845CFA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNELBASE ref: 0661EADF
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885707053.0000000006610000.00000040.00000800.00020000.00000000.sdmp, Offset: 06610000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6610000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemoryStatus
                                                        • String ID:
                                                        • API String ID: 1890195054-0
                                                        • Opcode ID: 580bfc0246db92fbecbfc139f6c4f3f047659219fed39ab9e072b2eb607951e3
                                                        • Instruction ID: 9a83784b12e99626e7d11734148ce45f05874768f7a1a6a959ef3447ba9daae3
                                                        • Opcode Fuzzy Hash: 580bfc0246db92fbecbfc139f6c4f3f047659219fed39ab9e072b2eb607951e3
                                                        • Instruction Fuzzy Hash: 3C11F3B1C006699FCB10DF9AC545BDEFBF4BF48320F14816AE818A7250D778A944CFA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: \Vl
                                                        • API String ID: 0-682378881
                                                        • Opcode ID: 912b723675efd070a5bb0bf8724316b728632bd4ab33a57ef076c2bd1f7ab7b5
                                                        • Instruction ID: ec42f7f6e5c1db1ff0636595be6f4b81d92e0b91c48ba2fb22dc05b8bfb010d8
                                                        • Opcode Fuzzy Hash: 912b723675efd070a5bb0bf8724316b728632bd4ab33a57ef076c2bd1f7ab7b5
                                                        • Instruction Fuzzy Hash: 8E915EB0E002199FDF10CFA8E9857DDBBF2AF48318F249129E415B7294DB749995CF81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LR^q
                                                        • API String ID: 0-2625958711
                                                        • Opcode ID: 95b0def82f6fded0f665ef0d9ff05b85228c6a7f79fd064b318e8aea929fddc8
                                                        • Instruction ID: 77f2809c9dd0c6d79038cd43f151ece236480b1adde65e195da195b9e7b8d5b7
                                                        • Opcode Fuzzy Hash: 95b0def82f6fded0f665ef0d9ff05b85228c6a7f79fd064b318e8aea929fddc8
                                                        • Instruction Fuzzy Hash: D3619E34714224CFDB04EB68E558AAE7BF1EF89314F2054A9E406EB3A1CB75DC45CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LR^q
                                                        • API String ID: 0-2625958711
                                                        • Opcode ID: e782dabfba720a2acd33501fce256f6d2005d20c85027aca85a410c621a54fcf
                                                        • Instruction ID: 4f042447d987646a70be0be76e27b11ccfd987152d4948aa00ed85f71d19cfa1
                                                        • Opcode Fuzzy Hash: e782dabfba720a2acd33501fce256f6d2005d20c85027aca85a410c621a54fcf
                                                        • Instruction Fuzzy Hash: 8731AC30E14219CFEB15CFA5D4447AEB3B2EF96304F219969E842FB290EB709C42CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LR^q
                                                        • API String ID: 0-2625958711
                                                        • Opcode ID: 0bde0c5e3fbb80eef993026f358835e656ce8bde7ce7cd79a8ba7e997e6db859
                                                        • Instruction ID: e45375c911973f071f837b832809ed4e7be03e35c79bc0e2db92a2fbcaab0bbe
                                                        • Opcode Fuzzy Hash: 0bde0c5e3fbb80eef993026f358835e656ce8bde7ce7cd79a8ba7e997e6db859
                                                        • Instruction Fuzzy Hash: 39318F30E14219CBDB14CFA5D4446AEB7B2FF85304F21946AE846FB240EB709D42CB61
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LR^q
                                                        • API String ID: 0-2625958711
                                                        • Opcode ID: eee826582a76e4b69b2074f97416c8d0aab2541cbfd052dac6954fb230ab5179
                                                        • Instruction ID: b68e30900a9c960cf346ee631976540b395adef02a4ff222bc67d1d7802faafe
                                                        • Opcode Fuzzy Hash: eee826582a76e4b69b2074f97416c8d0aab2541cbfd052dac6954fb230ab5179
                                                        • Instruction Fuzzy Hash: D72135317082509FC705FB79A46579E7FA1EF86300F0045EAD049CB396DA718C49CBA2
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Ko
                                                        • API String ID: 0-716275355
                                                        • Opcode ID: 39ee1d527f586cbb5f3f04d989b8e4d304c8fd13dfe6908186d7394eb9f7254f
                                                        • Instruction ID: 117bab5f974a1a0b9c4f7af4562d84a44b528436cef296f33e71689ef1dec3f1
                                                        • Opcode Fuzzy Hash: 39ee1d527f586cbb5f3f04d989b8e4d304c8fd13dfe6908186d7394eb9f7254f
                                                        • Instruction Fuzzy Hash: 82119131B102248FDF5C6A78F85476FB2A1EB91318F205979E006EF3E6DA61CD858BD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Ko
                                                        • API String ID: 0-716275355
                                                        • Opcode ID: d519c5ba51ce7c0dce85ff831b1862418bff9381357c595c1a618c2ab15d5c4a
                                                        • Instruction ID: 0e37981d12303650d3e90d90bfd34977e50ce5eb7c2f29ffc126f950a3ad6955
                                                        • Opcode Fuzzy Hash: d519c5ba51ce7c0dce85ff831b1862418bff9381357c595c1a618c2ab15d5c4a
                                                        • Instruction Fuzzy Hash: B311BF31A002249FDF1D5AB4F85436BB661EB92358F10597AE402EB2D3EA60CD858BD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 62e4f69654180ff2d6e29ab94d7f224296019939a8f74296a54203dfa3aba4ac
                                                        • Instruction ID: 06947113a049a70d11634b647db99dcd7d1be4a33fa84480abf4234900ff7a8c
                                                        • Opcode Fuzzy Hash: 62e4f69654180ff2d6e29ab94d7f224296019939a8f74296a54203dfa3aba4ac
                                                        • Instruction Fuzzy Hash: 6C825C38B00614CFC759EF24E5A5A6E77B2EB88700F10A8AAD909D7368DF719D42CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6c0e95bc00acbc97dab33a7b678761b3d7d48103756d99adc6f53dc8634c2089
                                                        • Instruction ID: 8152a6983770116c38a5a5aa843f876340e8d3cdbecafa25975fd1f9a98b509a
                                                        • Opcode Fuzzy Hash: 6c0e95bc00acbc97dab33a7b678761b3d7d48103756d99adc6f53dc8634c2089
                                                        • Instruction Fuzzy Hash: 60825C38B00614CFC759EF24E5A5A6E77B2EB88700F10A8AAD909D7368DF719D42CF51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f06e9088d4814ec0e57654607cfc861bf434358e2a2e51e9cc216e7c02f4510c
                                                        • Instruction ID: 32dcd02df47114b7a7429c55e34c6f3a6d207fb523d1499ae7a123fac6acb284
                                                        • Opcode Fuzzy Hash: f06e9088d4814ec0e57654607cfc861bf434358e2a2e51e9cc216e7c02f4510c
                                                        • Instruction Fuzzy Hash: 5322B0707011019FDB19AB38E594269B7A3FBC5346F24697AE002CF355CF71ED8687A1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1f4dfe629c892ddf6e9d1d51313158248acbdcbd4c23ab4aaaeff19c153f5a35
                                                        • Instruction ID: c342f0683e9c77ab7c2b3cf1561f6155d631f1b886d1c20dfec362c5ff686820
                                                        • Opcode Fuzzy Hash: 1f4dfe629c892ddf6e9d1d51313158248acbdcbd4c23ab4aaaeff19c153f5a35
                                                        • Instruction Fuzzy Hash: C4129D707011059FDB19AB38E59026DB3A3EBC5346F24A97AE006CF355CF71ED868BA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fe9b38d67047eee450dc00a54676a5fc52d4a1816ae0f41edf9eb6073ec9944b
                                                        • Instruction ID: 9ed7008e409f22643703822d11562d13dcd0c1b5bdbb743a22df9ef74aaee3f0
                                                        • Opcode Fuzzy Hash: fe9b38d67047eee450dc00a54676a5fc52d4a1816ae0f41edf9eb6073ec9944b
                                                        • Instruction Fuzzy Hash: CFE17234B00214CFCB14DF68E994AAEB7B2EB88314F285479E506EB354DB35DC46CB82
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5e4fa423023a24cee768ac10123a228a28807394ed4517d01e695a124a6953b6
                                                        • Instruction ID: 1b7bf7fd49d55d0de4fda63ce16d93641dd1146ff7c5c585b291fc937057c26b
                                                        • Opcode Fuzzy Hash: 5e4fa423023a24cee768ac10123a228a28807394ed4517d01e695a124a6953b6
                                                        • Instruction Fuzzy Hash: 18D1A070A002158FDB14DF69E88079EB7B2FF88314F28957AE509EB395DB70DC458B92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7427770b947e6638ffb7922e5ced5880ab82eac9205c75c6061bbe69290f3262
                                                        • Instruction ID: dbf243dc3960e1d28f51949f329803c8194a98bcccdd1126bb82a16ae365b289
                                                        • Opcode Fuzzy Hash: 7427770b947e6638ffb7922e5ced5880ab82eac9205c75c6061bbe69290f3262
                                                        • Instruction Fuzzy Hash: 9DB131B0E002298FDF10CFA8E8967DDBBF1AF48358F149529D815F7294EB749845CB81
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d5379c9b128216c671edd311b8ff6b8b64f9676fbcd5581433857a67fc3ea821
                                                        • Instruction ID: 7451a2f58f0c15b64e9b542e9cff22714a00d14a5712969c1968d5649445676e
                                                        • Opcode Fuzzy Hash: d5379c9b128216c671edd311b8ff6b8b64f9676fbcd5581433857a67fc3ea821
                                                        • Instruction Fuzzy Hash: 875134B4E002288FDB14DFA9D885B9DBBB1FF48304F158119E819BB351CB74A944CF95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7c496ac7c6218fced7690484d7756102b67802c0646da10807adc8e015e8b020
                                                        • Instruction ID: b107b75f00eb2e88cb262fc0f2518f8925fbd7efb455f150d27c86fe2e7eec65
                                                        • Opcode Fuzzy Hash: 7c496ac7c6218fced7690484d7756102b67802c0646da10807adc8e015e8b020
                                                        • Instruction Fuzzy Hash: AB415975A002515FCF12AF38F85875E7BA6EBD1308F0415E6D00AD7366EB74CE498782
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c046b93a3c8fbfa1e9c5bcfb158c3545a06b2e6fb2cdbc613d8155b1f466c3a9
                                                        • Instruction ID: 1a690c8927e44229c05f09b474b986d4453fa29376c1e01ee3207371c9453553
                                                        • Opcode Fuzzy Hash: c046b93a3c8fbfa1e9c5bcfb158c3545a06b2e6fb2cdbc613d8155b1f466c3a9
                                                        • Instruction Fuzzy Hash: 3B514574E002288FDB14DFA9D885B9DBBF1BF48304F158119E819BB350CB74A845CF91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 86d2600fe4370012a651f8ac7c98cd1bfd9d83932b76c0ee033f424ade5adaac
                                                        • Instruction ID: c42b2476b774606133aa8d343c06a81893294f77924cd2e614f749e7352197d1
                                                        • Opcode Fuzzy Hash: 86d2600fe4370012a651f8ac7c98cd1bfd9d83932b76c0ee033f424ade5adaac
                                                        • Instruction Fuzzy Hash: 9B510D34111A418FC70AFF6CFAA1A597BB6F7D230970469E9D0045B37EDB706989CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8606145ddaa758508ec36c7fd5f91158baebb7b4fa8cd1a4c2b3da97d83cb0ad
                                                        • Instruction ID: 76bf52d6781072cfc03fcc2180f5848cb12936ca5771efa7f3bb3b2dfd0fa298
                                                        • Opcode Fuzzy Hash: 8606145ddaa758508ec36c7fd5f91158baebb7b4fa8cd1a4c2b3da97d83cb0ad
                                                        • Instruction Fuzzy Hash: DE51FB34211A41CFC70AFB6CFAA1A597BB6F7D530930469E9D0045B33EDB706989CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 585714f10a64884192bfd337cc9c97f76446a998974ce30103c54ab8342cd73b
                                                        • Instruction ID: f093d556ca6c31f007ddc0826fa912f7325ebec562b3531ac626337b2695fb1d
                                                        • Opcode Fuzzy Hash: 585714f10a64884192bfd337cc9c97f76446a998974ce30103c54ab8342cd73b
                                                        • Instruction Fuzzy Hash: EB41EFB0D003599FDB14CFA9D485ADEBFB5EF48314F24802AE419AB254DB749945CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 23d5f1ed9c184b6457b6e5282ffe3ed5cf7ae01f6600d8888dabd5b85a33e040
                                                        • Instruction ID: 8bbe0ea78ccd4861d5f598db17d910282a3211bbc7a382bf3ebafbff28e6e2b4
                                                        • Opcode Fuzzy Hash: 23d5f1ed9c184b6457b6e5282ffe3ed5cf7ae01f6600d8888dabd5b85a33e040
                                                        • Instruction Fuzzy Hash: 0B41EFB0D00359EFDB14DFA9C484ADEBFB5FF48314F24842AE809AB254DB75A945CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 35cc33d148754625ff7f4412a213fd2a09a3503c9d2afc020ce2c646d23713d4
                                                        • Instruction ID: 156786051cae8bd66bea2d4bf45f5fb5e3739c5da687f631865ef7221e035e0c
                                                        • Opcode Fuzzy Hash: 35cc33d148754625ff7f4412a213fd2a09a3503c9d2afc020ce2c646d23713d4
                                                        • Instruction Fuzzy Hash: 4A315C35701A298FDB18EB74DA1179D73F6AF88348F2014A8D401BB3A4DB36DD41CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d10b7fecf60d8b5361f08b7e5f9150a7363041c6bc0127ffd051d5c4568c841a
                                                        • Instruction ID: b84766e66fc6a1bed3092519d8dc78323df432b5bba6167db0bb0b5a0d0b62de
                                                        • Opcode Fuzzy Hash: d10b7fecf60d8b5361f08b7e5f9150a7363041c6bc0127ffd051d5c4568c841a
                                                        • Instruction Fuzzy Hash: 3E318D31701A258FDB18EB74EA50AAD77F2AF88308F2014ECD401BB3A4DB368D51CB95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2878704083.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_c5d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1955b7e8e0446d80502176f933e72570399a1e6f9ec59d4f1929e9fe8f0719b7
                                                        • Instruction ID: b0e8c5fa6a68bd8a50b5778f67f563b2b4a706e5eb76c13032bd10c0a6d1eb88
                                                        • Opcode Fuzzy Hash: 1955b7e8e0446d80502176f933e72570399a1e6f9ec59d4f1929e9fe8f0719b7
                                                        • Instruction Fuzzy Hash: 72312B7550E3C08FD7138B24C9A4715BF71AF47214F2985DBD889CF2A7C22A984ECB62
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c1c1a0cbec5ce8d5e21c5d40cbd3a187911c92ebf9d25ffee7449a9e7667c12b
                                                        • Instruction ID: 9c2574ae073f904a9e3a9d66df87f396723ac0226d92d838cb7a0efc820b785a
                                                        • Opcode Fuzzy Hash: c1c1a0cbec5ce8d5e21c5d40cbd3a187911c92ebf9d25ffee7449a9e7667c12b
                                                        • Instruction Fuzzy Hash: 2B3107345001514FCF12EB38F89875D7765EBA2348F006AE6D006DB2BAD774CD8ACB92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d1f83dac56455aec2469b060567dbf14e2125c8de545ad766d50d089cb72b664
                                                        • Instruction ID: a5363be75bc68ce1b0aae38b6124b3dd0c34cc12cc1aa6ce0841902975ce8b1c
                                                        • Opcode Fuzzy Hash: d1f83dac56455aec2469b060567dbf14e2125c8de545ad766d50d089cb72b664
                                                        • Instruction Fuzzy Hash: E3318171E0021A9BDB05CFA5E85469EF7B2FF89314F18952AE805FB350DB709C46CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f868225afca30e605be6e519430eead91bb4b3f86eedd6cbea0a0cbb9aa07e9f
                                                        • Instruction ID: 7a3afd9ec18af50dd4fa4bbedde17483d3d574d862fcf9824603798afedd16bd
                                                        • Opcode Fuzzy Hash: f868225afca30e605be6e519430eead91bb4b3f86eedd6cbea0a0cbb9aa07e9f
                                                        • Instruction Fuzzy Hash: 94217171E002199BCB05DFA5E854A9EF7B6FF89314F18952AE805BB340DB709C46CB91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6c7f1194ffdceab19951930afb69b2dcc0740dd961896bb093384ddb766b25f
                                                        • Instruction ID: 0607f8db565fbf534940462e413e073085f43039786213692cf6282129e1ad9c
                                                        • Opcode Fuzzy Hash: f6c7f1194ffdceab19951930afb69b2dcc0740dd961896bb093384ddb766b25f
                                                        • Instruction Fuzzy Hash: BC213B706013204FDF356765F95832D3762D762359F0015FAD01AFB2A1CEA5CD888752
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3738dac50416e0b5fe78e29d9288ae16ffe89e4452ad50376a9b33eba314692a
                                                        • Instruction ID: 7f001c31553f9506f354310907312536f1967cc9f8e20d720dd06b5ddd264d74
                                                        • Opcode Fuzzy Hash: 3738dac50416e0b5fe78e29d9288ae16ffe89e4452ad50376a9b33eba314692a
                                                        • Instruction Fuzzy Hash: 6F21BF31E002168BDB09CFA4D4519EEF7B2BF89314F24952AE815FB381DB70AC42CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2878704083.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_c5d000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4f2b85e079f530dda109dfde8741afcaccd1aeb96c1ea0864995304e29baf2d5
                                                        • Instruction ID: 3f51a7b97aa5a0046655fe019fa7d8db89ffba256357580f7af1f4e6c3fb3971
                                                        • Opcode Fuzzy Hash: 4f2b85e079f530dda109dfde8741afcaccd1aeb96c1ea0864995304e29baf2d5
                                                        • Instruction Fuzzy Hash: B5210479504304DFCB24DF24D9C4B26BBA5FB84315F20C56DEC4A4B392C73AD88ACA66
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 020801bc0ee40ea99b494e29c6a9d41e758526e513779a0d73c4d79653ba4f20
                                                        • Instruction ID: 2bc2e5ad2e6eaf4c33ab550b25ecaa1752b36ab591e19247b70403b4269a4fec
                                                        • Opcode Fuzzy Hash: 020801bc0ee40ea99b494e29c6a9d41e758526e513779a0d73c4d79653ba4f20
                                                        • Instruction Fuzzy Hash: 57214835B00654CFDB14DB78DA58BAE7BF1AF89304B2014A8E406FB3A5EB719D00CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7331a684cace20f3ba90333870bc3d77909d07edf32a77c40861e09fe8613ad1
                                                        • Instruction ID: 7f7f2f0878a8ceb04cd62ccf5d397ac581813a04c8b0790ec2fb78e9b860f241
                                                        • Opcode Fuzzy Hash: 7331a684cace20f3ba90333870bc3d77909d07edf32a77c40861e09fe8613ad1
                                                        • Instruction Fuzzy Hash: 22216B307002258FDB18EB68D6657AD77F1AB99308F2014E8D005FB2A1DB368E81CBA1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5137999d717ca8fc68d0369219094d64e55212e23588e511434035aa08deeed2
                                                        • Instruction ID: b04a474d9ae3c365aa3ca4946c1eb37aab699dbf5e891d368d1957f943d01682
                                                        • Opcode Fuzzy Hash: 5137999d717ca8fc68d0369219094d64e55212e23588e511434035aa08deeed2
                                                        • Instruction Fuzzy Hash: CC213030700219CFDB18EB64D6657AE77F5AB99344F2014A8D005FB364DB36DE81CBA5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4b221b1c977dea56edf91f248d8d70f8046ce98b39d755396046332f7511486f
                                                        • Instruction ID: 9eb7c21f6d896acc6ffefe29892a43d5270635ae9bf46b537a0242f33beb9db1
                                                        • Opcode Fuzzy Hash: 4b221b1c977dea56edf91f248d8d70f8046ce98b39d755396046332f7511486f
                                                        • Instruction Fuzzy Hash: CD219531E002159BDB15CFA5D550AEEF7B2BF89304F24952AE815FB381DB70AC46CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02cde09a77bdd3f5b248153655b1309aae5d9c0fb1b0a4e396082619a6c97d15
                                                        • Instruction ID: 248e83056383fd6de057b6351db0cfc5712b6e2b39c29c3ddce4577edf585a97
                                                        • Opcode Fuzzy Hash: 02cde09a77bdd3f5b248153655b1309aae5d9c0fb1b0a4e396082619a6c97d15
                                                        • Instruction Fuzzy Hash: 83210D346001115FCF11FB28F89875E735AE796308F0069B6D00AD7379DBB0DD898B92
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d7a5c873034aec23deae53f764a746a3937e85508e6d6af100800629b2ddc798
                                                        • Instruction ID: 04e459905036a40c41f62f814b5a9e0e780f98ee4340d21d54f72b3d8dc0ae4f
                                                        • Opcode Fuzzy Hash: d7a5c873034aec23deae53f764a746a3937e85508e6d6af100800629b2ddc798
                                                        • Instruction Fuzzy Hash: 5D21FC35700614CFDB14DB75DA59BAE77F1AF89304B2014A8E406F73A5DB759D00CB90
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4e386eb5fd21631d84d189eb2b977b90b329a7dcd15c9acb12088fa19e310f9a
                                                        • Instruction ID: b2a8008305136233fbadfb09d154542bfb6f3cc5091d6a53b0afb5f5dea17f98
                                                        • Opcode Fuzzy Hash: 4e386eb5fd21631d84d189eb2b977b90b329a7dcd15c9acb12088fa19e310f9a
                                                        • Instruction Fuzzy Hash: D9117031B003659FDB21AFB8A4511AEBBF5EF88314B1414B9D806F7242D735DA428BE5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1188336dd98b34a2bafe7c8f4a0ea97967d93b96bfce3cbc2ec1b56c2463bbbb
                                                        • Instruction ID: 4423d0b811d3ca20a8ea4a1ee1ba6b0bcf7447691b496b7737db8681ff30d9a3
                                                        • Opcode Fuzzy Hash: 1188336dd98b34a2bafe7c8f4a0ea97967d93b96bfce3cbc2ec1b56c2463bbbb
                                                        • Instruction Fuzzy Hash: 02016131B002248FDF21EFB8A55119DB7E5EB58314B1414BAD805F7342E735DA418BE1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dff34ac0d5e92322aa20576b9fe1a47a913de67080cf0f883c18eedada3827cb
                                                        • Instruction ID: c0e61be34e662253567add514c141bff11577a30777afab8de839132c98c57bf
                                                        • Opcode Fuzzy Hash: dff34ac0d5e92322aa20576b9fe1a47a913de67080cf0f883c18eedada3827cb
                                                        • Instruction Fuzzy Hash: 0001623491424CAFCB41FBB8F9659DDBBB5EB40304F0066B9C0099B269DFB06F499792
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: af56e97699d1248df75390d98338ad7c9ab747e1b1ffc794e2e203c4699f3199
                                                        • Instruction ID: 66f12b39dfb911b53fb71d7792b983a30436a18b8346781ac64029001b95ea82
                                                        • Opcode Fuzzy Hash: af56e97699d1248df75390d98338ad7c9ab747e1b1ffc794e2e203c4699f3199
                                                        • Instruction Fuzzy Hash: C6F02B33A44170CFD7229FA4B4911ACBBA1EEE832171920E7D846FB252D735DA42D751
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fec572bc11ba0767e92d867a2041afbfbc49b7c095b5b33f563b34473fe20386
                                                        • Instruction ID: 5c69f5aa02bcbad2a4e94dfdcdda5a8f5db86836163a9988b403289cbfc9537b
                                                        • Opcode Fuzzy Hash: fec572bc11ba0767e92d867a2041afbfbc49b7c095b5b33f563b34473fe20386
                                                        • Instruction Fuzzy Hash: CDF0C435B00114CFC714EB64E998B6D77B2EF88755F6140A8E5069B3A0CF35AD42CB51
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2879692137.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_e20000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 84af1a4d0bafa3b6ed4647433316b37c6eb2b9dcca01192fa999e7399e1261d7
                                                        • Instruction ID: 9d86aa91295b11e9ad36bff6e872feb6f67eeead7b3150e45d8be45cac82805d
                                                        • Opcode Fuzzy Hash: 84af1a4d0bafa3b6ed4647433316b37c6eb2b9dcca01192fa999e7399e1261d7
                                                        • Instruction Fuzzy Hash: D7F06834910109EFCB45FBB8F95199DB7B5EB40304F1066B9C0059B268DF716F498B91
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 06762E86
                                                        • GetCurrentThread.KERNEL32 ref: 06762EC3
                                                        • GetCurrentProcess.KERNEL32 ref: 06762F00
                                                        • GetCurrentThreadId.KERNEL32 ref: 06762F59
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885920332.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6760000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 66d6915939c5d692ea7661e5094124fca7e183965f8c11e4ec2838d75574e183
                                                        • Instruction ID: 95f0c76511f708ee8d5b18bf43f24f0e19d011e88b21c2f1f71a8a5db651ae7e
                                                        • Opcode Fuzzy Hash: 66d6915939c5d692ea7661e5094124fca7e183965f8c11e4ec2838d75574e183
                                                        • Instruction Fuzzy Hash: B95169B0D003098FDB54DFAAD948BEEBBF1AB48314F20C469E419A7361D7346984CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32 ref: 06762E86
                                                        • GetCurrentThread.KERNEL32 ref: 06762EC3
                                                        • GetCurrentProcess.KERNEL32 ref: 06762F00
                                                        • GetCurrentThreadId.KERNEL32 ref: 06762F59
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2885920332.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_6760000_SecuriteInfo.jbxd
                                                        Similarity
                                                        • API ID: Current$ProcessThread
                                                        • String ID:
                                                        • API String ID: 2063062207-0
                                                        • Opcode ID: 1ed784e6ec9f2dd0550d8de93b1af955b75a076893f095e04c82a57eed90285f
                                                        • Instruction ID: 9874870348b52ae774f9169b5d864d0a1410fb5ddf2f2a7b63e4434b28832d92
                                                        • Opcode Fuzzy Hash: 1ed784e6ec9f2dd0550d8de93b1af955b75a076893f095e04c82a57eed90285f
                                                        • Instruction Fuzzy Hash: 7F5159B0D003098FDB54DFAAD948BDEBBF1AB48314F20C469E419A7361D7746984CF65
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%