Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Lazy.207585.14889.25639

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Lazy.207585.14889.25639 (renamed file extension from 25639 to exe)
Analysis ID:680333
MD5:62a5493cbeda91c0d3b7593bb0a00424
SHA1:9e6941500fbb55c643ce5e59e3bd86e114f4a73d
SHA256:60383046971044bc8d25ec8a3cc0bf559dca620af2b978d2cd7f5c35363c44c5
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Modifies the hosts file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "ventas@bluemix.cl", "Password": "bluemix2020737", "Host": "mail.bluemix.cl"}
SourceRuleDescriptionAuthorStrings
00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x301f8:$a13: get_DnsResolver
      • 0x2ea06:$a20: get_LastAccessed
      • 0x30b76:$a27: set_InternalServerPort
      • 0x30e95:$a30: set_GuidMasterKey
      • 0x2eb0d:$a33: get_Clipboard
      • 0x2eb1b:$a34: get_Keyboard
      • 0x2fe13:$a35: get_ShiftKeyDown
      • 0x2fe24:$a36: get_AltKeyDown
      • 0x2eb28:$a37: get_Password
      • 0x2f5c3:$a38: get_PasswordHash
      • 0x305f8:$a39: get_DefaultCredentials
      00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 11 entries
          SourceRuleDescriptionAuthorStrings
          6.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            6.0.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              6.0.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32cc1:$s10: logins
              • 0x32728:$s11: credential
              • 0x2ed0d:$g1: get_Clipboard
              • 0x2ed1b:$g2: get_Keyboard
              • 0x2ed28:$g3: get_Password
              • 0x30003:$g4: get_CtrlKeyDown
              • 0x30013:$g5: get_ShiftKeyDown
              • 0x30024:$g6: get_AltKeyDown
              6.0.RegSvcs.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x303f8:$a13: get_DnsResolver
              • 0x2ec06:$a20: get_LastAccessed
              • 0x30d76:$a27: set_InternalServerPort
              • 0x31095:$a30: set_GuidMasterKey
              • 0x2ed0d:$a33: get_Clipboard
              • 0x2ed1b:$a34: get_Keyboard
              • 0x30013:$a35: get_ShiftKeyDown
              • 0x30024:$a36: get_AltKeyDown
              • 0x2ed28:$a37: get_Password
              • 0x2f7c3:$a38: get_PasswordHash
              • 0x307f8:$a39: get_DefaultCredentials
              0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 11 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeVirustotal: Detection: 57%Perma Link
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeReversingLabs: Detection: 35%
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeJoe Sandbox ML: detected
                Source: 6.0.RegSvcs.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 6.0.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "ventas@bluemix.cl", "Password": "bluemix2020737", "Host": "mail.bluemix.cl"}
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Joe Sandbox ViewIP Address: 104.149.221.234 104.149.221.234
                Source: global trafficTCP traffic: 192.168.2.4:49757 -> 104.149.221.234:587
                Source: global trafficTCP traffic: 192.168.2.4:49757 -> 104.149.221.234:587
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://BhHVua.com
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bluemix.cl
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: RegSvcs.exe, 00000006.00000003.314168789.0000000005DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505118218.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505142726.0000000002DBA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://d1GB0YAapow6XmOM.org
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.bluemix.cl
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comP
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.combig
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comig4
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                Source: RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: mail.bluemix.cl

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                System Summary

                barindex
                Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.RegSvcs.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bF4E9DFE3u002dF8F3u002d41FCu002dB96Cu002d8730A4AF5432u007d/E6DC0371u002dC852u002d4937u002d8582u002dBEDB15C72A37.csLarge array initialization: .cctor: array initializer size 11673
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTRMatched rule: SUSP_Reversed_Base64_Encoded_EXE date = 2020-04-06, hash1 = 7e6d9a5d3b26fd1af7d58be68f524c4c55285b78304a65ec43073b139c9407a8, author = Florian Roth, description = Detects an base64 encoded executable with reversed characters, score = file, reference = Internal Research
                Source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_00BC50280_2_00BC5028
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_00BCCB540_2_00BCCB54
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_00BC50180_2_00BC5018
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_00BCF3B00_2_00BCF3B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_00BCF3C00_2_00BCF3C0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeCode function: 0_2_06DD0D4C0_2_06DD0D4C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_029AF3C86_2_029AF3C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_029AF0806_2_029AF080
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_029A61206_2_029A6120
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_054B1FF86_2_054B1FF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_054B00406_2_054B0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_054BCA606_2_054BCA60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06326E806_2_06326E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632F7B76_2_0632F7B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632A3806_2_0632A380
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063275F06_2_063275F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216626_2_06321662
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632166A6_2_0632166A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632E2506_2_0632E250
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632165E6_2_0632165E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216B26_2_063216B2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216B66_2_063216B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216BA6_2_063216BA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216BE6_2_063216BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216A66_2_063216A6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216AA6_2_063216AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216AE6_2_063216AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632169A6_2_0632169A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632169E6_2_0632169E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216F26_2_063216F2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216F66_2_063216F6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216FA6_2_063216FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216FE6_2_063216FE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216E26_2_063216E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216E66_2_063216E6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216EA6_2_063216EA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216EE6_2_063216EE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216D26_2_063216D2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216D66_2_063216D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216DA6_2_063216DA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216DE6_2_063216DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216C26_2_063216C2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216C66_2_063216C6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216CA6_2_063216CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216CE6_2_063216CE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217326_2_06321732
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063233306_2_06323330
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217366_2_06321736
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632173A6_2_0632173A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217226_2_06321722
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217266_2_06321726
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632172A6_2_0632172A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632172E6_2_0632172E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217126_2_06321712
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217166_2_06321716
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632171A6_2_0632171A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632171E6_2_0632171E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217026_2_06321702
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217066_2_06321706
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632170A6_2_0632170A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632170E6_2_0632170E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217426_2_06321742
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063217466_2_06321746
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063200406_2_06320040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063F29786_2_063F2978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063F56C06_2_063F56C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063F86116_2_063F8611
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063F4CF06_2_063F4CF0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063F68A06_2_063F68A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 054B5A60 appears 57 times
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000000.230304373.00000000002AA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamet2mR0.exeH vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.289420556.0000000008C20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevZZZaOqVzVvOBwlBSUZqc.exe4 vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.288934216.0000000006EF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.273362456.0000000002691000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.273362456.0000000002691000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevZZZaOqVzVvOBwlBSUZqc.exe4 vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeBinary or memory string: OriginalFilenamet2mR0.exeH vs SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeVirustotal: Detection: 57%
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeReversingLabs: Detection: 35%
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Lazy.207585.14889.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@5/2@2/1
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMutant created: \Sessions\1\BaseNamedObjects\YNyZUGITHvKLmbxGFrydO
                Source: 6.0.RegSvcs.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.RegSvcs.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06321662 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632166A push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632165E push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216B2 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216B6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216BA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216BE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216A6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216AA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216AE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632169A push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632169E push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216F2 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632F6F1 push es; ret 6_2_0632F6F7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216F6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216FA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216FE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216E2 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216E6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216EA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216EE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216D2 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216D6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216DA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216DE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216C2 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216C6 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216CA push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_063216CE push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06321732 push es; ret 6_2_063218C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_06321736 push es; ret 6_2_063218C4
                Source: initial sampleStatic PE information: section name: .text entropy: 7.41882242323763
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTR
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe TID: 1748Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9689Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 6_2_0632DC88 LdrInitializeThunk,6_2_0632DC88
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 436000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 438000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 6D2008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.0.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.384c890.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Lazy.207585.14889.exe.3767c10.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Lazy.207585.14889.exe PID: 1100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3736, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception211
                Process Injection
                1
                Masquerading
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                File and Directory Permissions Modification
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Disable or Modify Tools
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)131
                Virtualization/Sandbox Evasion
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script211
                Process Injection
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common11
                Deobfuscate/Decode Files or Information
                Cached Domain Credentials114
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                Obfuscated Files or Information
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
                Software Packing
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Variant.Lazy.207585.14889.exe58%VirustotalBrowse
                SecuriteInfo.com.Variant.Lazy.207585.14889.exe36%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                SecuriteInfo.com.Variant.Lazy.207585.14889.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                6.0.RegSvcs.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                bluemix.cl0%VirustotalBrowse
                mail.bluemix.cl0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fonts.comig40%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.fonts.comP0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://d1GB0YAapow6XmOM.org0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://mail.bluemix.cl0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://BhHVua.com0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://bluemix.cl0%Avira URL Cloudsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.fonts.combig0%Avira URL Cloudsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://api.ipify.org%0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                bluemix.cl
                104.149.221.234
                truefalseunknown
                mail.bluemix.cl
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://sectigo.com/CPS0RegSvcs.exe, 00000006.00000002.508271478.0000000005D98000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers/?SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fonts.comig4SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwRegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fonts.comPSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.tiro.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.org%%startupfolder%RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            low
                            http://www.goodfont.co.krSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sajatypeworks.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://d1GB0YAapow6XmOM.orgRegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505118218.0000000002DB2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.505142726.0000000002DBA000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-user.htmlSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://mail.bluemix.clRegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://DynDns.comDynDNSnamejidpasswordPsi/PsiRegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://BhHVua.comRegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fonts.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://bluemix.clRegSvcs.exe, 00000006.00000002.505019128.0000000002D8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.urwpp.deDPleaseSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.combigSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000003.235850074.0000000000CEC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.zhongyicts.com.cnSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sakkal.comSecuriteInfo.com.Variant.Lazy.207585.14889.exe, 00000000.00000002.285875757.0000000006812000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.org%RegSvcs.exe, 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    low
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.149.221.234
                                    bluemix.clUnited States
                                    397423TIER-NETUSfalse
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:680333
                                    Start date and time: 08/08/202212:06:122022-08-08 12:06:12 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 7m 51s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:SecuriteInfo.com.Variant.Lazy.207585.14889.25639 (renamed file extension from 25639 to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:28
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.adwa.spyw.evad.winEXE@5/2@2/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 88%
                                    • Number of executed functions: 96
                                    • Number of non-executed functions: 3
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    12:07:27API Interceptor1x Sleep call for process: SecuriteInfo.com.Variant.Lazy.207585.14889.exe modified
                                    12:07:35API Interceptor699x Sleep call for process: RegSvcs.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    104.149.221.234OLORI.exeGet hashmaliciousBrowse
                                      payment for invoice 64249.docxGet hashmaliciousBrowse
                                        payment for invoice64249.docxGet hashmaliciousBrowse
                                          payment for invoice 64249.docxGet hashmaliciousBrowse
                                            Revised Invoice.xlsxGet hashmaliciousBrowse
                                              c33l2KS7k0.exeGet hashmaliciousBrowse
                                                scan1962.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Variant.MSILHeracles.36859.299.exeGet hashmaliciousBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                    TIER-NETUShttps://andromadehk.net/frontpage/Webmail/webmail.php?email=cactus@gmail.comGet hashmaliciousBrowse
                                                    • 8.39.235.63
                                                    OLORI.exeGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    payment for invoice 64249.docxGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    payment for invoice64249.docxGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    payment for invoice 64249.docxGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    Revised Invoice.xlsxGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    c33l2KS7k0.exeGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    scan1962.exeGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    SecuriteInfo.com.Variant.MSILHeracles.36859.299.exeGet hashmaliciousBrowse
                                                    • 104.149.221.234
                                                    mirai.m68kGet hashmaliciousBrowse
                                                    • 155.254.17.216
                                                    elmAKUWDRmGet hashmaliciousBrowse
                                                    • 104.149.220.211
                                                    y1vJPim631Get hashmaliciousBrowse
                                                    • 181.214.133.87
                                                    GlKt2OVVbMGet hashmaliciousBrowse
                                                    • 155.254.17.212
                                                    http://bluesail.cc/Webmail/webmail.php?email=sean@virtualintelligencebriefing.comGet hashmaliciousBrowse
                                                    • 198.37.123.126
                                                    PO#325342.xlsxGet hashmaliciousBrowse
                                                    • 198.37.123.126
                                                    https://jpseuroauto.com/.wwww/600/?uid=cst1@anaintercontinental-tokyo.jpGet hashmaliciousBrowse
                                                    • 192.154.228.33
                                                    http://macro-blue.cam/Webmail/1/webmail.php?email=meqatil@bein.comGet hashmaliciousBrowse
                                                    • 198.37.123.126
                                                    http://macro-blue.cam/Webmail/1/webmail.php?email=$emailGet hashmaliciousBrowse
                                                    • 198.37.123.126
                                                    Nw PN #23069746XVNXH8W630HXFRATQH.vbsGet hashmaliciousBrowse
                                                    • 192.154.229.64
                                                    armGet hashmaliciousBrowse
                                                    • 192.154.202.30
                                                    No context
                                                    No context
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1216
                                                    Entropy (8bit):5.355304211458859
                                                    Encrypted:false
                                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                    MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                    SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                    SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                    SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):835
                                                    Entropy (8bit):4.694294591169137
                                                    Encrypted:false
                                                    SSDEEP:24:QWDZh+ragzMZfuMMs1L/JU5fFCkK8T1rTt8:vDZhyoZWM9rU5fFcP
                                                    MD5:6EB47C1CF858E25486E42440074917F2
                                                    SHA1:6A63F93A95E1AE831C393A97158C526A4FA0FAAE
                                                    SHA-256:9B13A3EA948A1071A81787AAC1930B89E30DF22CE13F8FF751F31B5D83E79FFB
                                                    SHA-512:08437AB32E7E905EB11335E670CDD5D999803390710ED39CBC31A2D3F05868D5D0E5D051CCD7B06A85BB466932F99A220463D27FAC29116D241E8ADAC495FA2F
                                                    Malicious:true
                                                    Reputation:high, very likely benign file
                                                    Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....127.0.0.1
                                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Entropy (8bit):7.41549459780222
                                                    TrID:
                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                    • Windows Screen Saver (13104/52) 0.07%
                                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                                    File name:SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                                                    File size:884736
                                                    MD5:62a5493cbeda91c0d3b7593bb0a00424
                                                    SHA1:9e6941500fbb55c643ce5e59e3bd86e114f4a73d
                                                    SHA256:60383046971044bc8d25ec8a3cc0bf559dca620af2b978d2cd7f5c35363c44c5
                                                    SHA512:28c2432e27bc3964a61c27dc5ba1ef98dea9f8a7f07e6bed32dfd42d18399f18c3cc952a394d15c494d0b4195552ef5f0f8925998e671810cc98f27909159e69
                                                    SSDEEP:12288:mhBQEIjT6JFjwi9BZNbvYbagLEtxGmfVMmI/OLB8DIEBIvfkOJxjza39AeLKvrBl:quzkjwi9BHtgL4p8OLmBIjzjZ
                                                    TLSH:0E155CA8319072DED927CA31CAA41C74EA617C77A71B921794633299DF3E987DF100B3
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....U.b..............P..j............... ........@.. ....................................@................................
                                                    Icon Hash:00828e8e8686b000
                                                    Entrypoint:0x4d892e
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x62F055E1 [Mon Aug 8 00:16:33 2022 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                    Instruction
                                                    jmp dword ptr [00402000h]
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    add byte ptr [eax], al
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd88d40x57.text
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x11f0.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x20000xd69340xd6a00False0.7423740535818287data7.41882242323763IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rsrc0xda0000x11f00x1200False0.3927951388888889data5.044747416478067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xdc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountry
                                                    RT_VERSION0xda0a00x334data
                                                    RT_MANIFEST0xda3d40xe15XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF, LF line terminators
                                                    DLLImport
                                                    mscoree.dll_CorExeMain
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Aug 8, 2022 12:07:50.903929949 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.060014963 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.060251951 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.277803898 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.278224945 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.434055090 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.434320927 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.592422962 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.629565954 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.797372103 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.797389030 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.797400951 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.797409058 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.797485113 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.797517061 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.801029921 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:51.830961943 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:51.986874104 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.049287081 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.133793116 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.290673018 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.292047977 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.449750900 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.450333118 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.630346060 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.631134033 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.787030935 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.787491083 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:52.951402903 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:52.951924086 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:53.107825041 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.108823061 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:53.108947039 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:53.109611988 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:53.109689951 CEST49757587192.168.2.4104.149.221.234
                                                    Aug 8, 2022 12:07:53.264444113 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.264504910 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.265361071 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.265377998 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.448128939 CEST58749757104.149.221.234192.168.2.4
                                                    Aug 8, 2022 12:07:53.643105030 CEST49757587192.168.2.4104.149.221.234
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Aug 8, 2022 12:07:50.034467936 CEST6209953192.168.2.48.8.8.8
                                                    Aug 8, 2022 12:07:50.425446033 CEST53620998.8.8.8192.168.2.4
                                                    Aug 8, 2022 12:07:50.483175993 CEST5377553192.168.2.48.8.8.8
                                                    Aug 8, 2022 12:07:50.875464916 CEST53537758.8.8.8192.168.2.4
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                    Aug 8, 2022 12:07:50.034467936 CEST192.168.2.48.8.8.80xe61eStandard query (0)mail.bluemix.clA (IP address)IN (0x0001)
                                                    Aug 8, 2022 12:07:50.483175993 CEST192.168.2.48.8.8.80x5ca5Standard query (0)mail.bluemix.clA (IP address)IN (0x0001)
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                    Aug 8, 2022 12:07:50.425446033 CEST8.8.8.8192.168.2.40xe61eNo error (0)mail.bluemix.clbluemix.clCNAME (Canonical name)IN (0x0001)
                                                    Aug 8, 2022 12:07:50.425446033 CEST8.8.8.8192.168.2.40xe61eNo error (0)bluemix.cl104.149.221.234A (IP address)IN (0x0001)
                                                    Aug 8, 2022 12:07:50.875464916 CEST8.8.8.8192.168.2.40x5ca5No error (0)mail.bluemix.clbluemix.clCNAME (Canonical name)IN (0x0001)
                                                    Aug 8, 2022 12:07:50.875464916 CEST8.8.8.8192.168.2.40x5ca5No error (0)bluemix.cl104.149.221.234A (IP address)IN (0x0001)
                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Aug 8, 2022 12:07:51.277803898 CEST58749757104.149.221.234192.168.2.4220-srv34.benzahosting.cl ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 06:07:51 -0400
                                                    220-We do not authorize the use of this system to transport unsolicited,
                                                    220 and/or bulk e-mail.
                                                    Aug 8, 2022 12:07:51.278224945 CEST49757587192.168.2.4104.149.221.234EHLO 067773
                                                    Aug 8, 2022 12:07:51.434055090 CEST58749757104.149.221.234192.168.2.4250-srv34.benzahosting.cl Hello 067773 [102.129.143.3]
                                                    250-SIZE 52428800
                                                    250-8BITMIME
                                                    250-PIPELINING
                                                    250-PIPE_CONNECT
                                                    250-AUTH PLAIN LOGIN
                                                    250-STARTTLS
                                                    250 HELP
                                                    Aug 8, 2022 12:07:51.434320927 CEST49757587192.168.2.4104.149.221.234STARTTLS
                                                    Aug 8, 2022 12:07:51.592422962 CEST58749757104.149.221.234192.168.2.4220 TLS go ahead

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:12:07:14
                                                    Start date:08/08/2022
                                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.207585.14889.exe"
                                                    Imagebase:0x1d0000
                                                    File size:884736 bytes
                                                    MD5 hash:62A5493CBEDA91C0D3B7593BB0A00424
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.280169100.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.275554875.00000000028E4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low

                                                    Target ID:4
                                                    Start time:12:07:30
                                                    Start date:08/08/2022
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:{path}
                                                    Imagebase:0xb0000
                                                    File size:45152 bytes
                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high

                                                    Target ID:6
                                                    Start time:12:07:31
                                                    Start date:08/08/2022
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:{path}
                                                    Imagebase:0x5f0000
                                                    File size:45152 bytes
                                                    MD5 hash:2867A3817C9245F7CF518524DFD18F28
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:.Net C# or VB.NET
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.268432848.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.501747915.0000000002A31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:13.2%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:138
                                                      Total number of Limit Nodes:5
                                                      execution_graph 26389 bccc38 DuplicateHandle 26390 bcccce 26389->26390 26546 bcc608 GetCurrentProcess 26547 bcc67b 26546->26547 26548 bcc682 GetCurrentThread 26546->26548 26547->26548 26549 bcc6bf GetCurrentProcess 26548->26549 26550 bcc6b8 26548->26550 26551 bcc6f5 26549->26551 26550->26549 26552 bcc71d GetCurrentThreadId 26551->26552 26553 bcc74e 26552->26553 26391 56e9b78 26392 56e9b8f 26391->26392 26395 56e8b98 26392->26395 26396 56e8ba3 26395->26396 26400 bc7e08 26396->26400 26410 bc62d4 26396->26410 26397 56e9ba9 26401 bc7e18 26400->26401 26402 bc80a6 26401->26402 26420 6dd1f90 26401->26420 26424 56e8560 26401->26424 26427 56e8830 26401->26427 26431 56e8ea0 26401->26431 26434 6dd1f80 26401->26434 26403 bc80e4 26402->26403 26439 bcc330 26402->26439 26403->26397 26411 bc62df 26410->26411 26413 bc80a6 26411->26413 26414 6dd1f90 2 API calls 26411->26414 26415 6dd1f80 2 API calls 26411->26415 26416 56e8ea0 2 API calls 26411->26416 26417 56e8830 2 API calls 26411->26417 26418 56e8560 2 API calls 26411->26418 26412 bc80e4 26412->26397 26413->26412 26419 bcc330 2 API calls 26413->26419 26414->26413 26415->26413 26416->26413 26417->26413 26418->26413 26419->26412 26444 bca230 26420->26444 26447 bca220 26420->26447 26421 6dd1f9e 26421->26402 26426 bca328 2 API calls 26424->26426 26425 56e856d 26425->26402 26426->26425 26429 bca230 2 API calls 26427->26429 26430 bca220 2 API calls 26427->26430 26428 56e883d 26428->26402 26429->26428 26430->26428 26470 56e8f38 26431->26470 26432 56e8eaf 26432->26402 26435 6dd1f88 26434->26435 26436 6dd1f9e 26435->26436 26437 bca230 2 API calls 26435->26437 26438 bca220 2 API calls 26435->26438 26436->26402 26437->26436 26438->26436 26440 bcc361 26439->26440 26441 bcc385 26440->26441 26473 bcc4df 26440->26473 26477 bcc4f0 26440->26477 26441->26403 26450 bca328 26444->26450 26445 bca23f 26445->26421 26448 bca23f 26447->26448 26449 bca328 2 API calls 26447->26449 26448->26421 26449->26448 26451 bca33b 26450->26451 26452 bca353 26451->26452 26458 bca5b0 26451->26458 26462 bca5a0 26451->26462 26452->26445 26453 bca34b 26453->26452 26454 bca550 GetModuleHandleW 26453->26454 26455 bca57d 26454->26455 26455->26445 26459 bca5c4 26458->26459 26460 bca5e9 26459->26460 26466 bc96f8 26459->26466 26460->26453 26463 bca5b0 26462->26463 26464 bc96f8 LoadLibraryExW 26463->26464 26465 bca5e9 26463->26465 26464->26465 26465->26453 26467 bcab90 LoadLibraryExW 26466->26467 26469 bcac09 26467->26469 26469->26460 26472 bca328 2 API calls 26470->26472 26471 56e8f47 26471->26432 26472->26471 26474 bcc4f0 26473->26474 26475 bcc537 26474->26475 26481 bcab5c 26474->26481 26475->26441 26479 bcc4fd 26477->26479 26478 bcc537 26478->26441 26479->26478 26480 bcab5c 2 API calls 26479->26480 26480->26478 26482 bcab67 26481->26482 26484 bcd230 26482->26484 26485 bcc884 26482->26485 26484->26484 26486 bcc88f 26485->26486 26487 bc62d4 2 API calls 26486->26487 26488 bcd29f 26487->26488 26492 bcf030 26488->26492 26498 bcf018 26488->26498 26489 bcd2d8 26489->26484 26494 bcf061 26492->26494 26495 bcf0ae 26492->26495 26493 bcf06d 26493->26489 26494->26493 26504 bcf378 26494->26504 26507 bcf369 26494->26507 26495->26489 26500 bcf061 26498->26500 26501 bcf0ae 26498->26501 26499 bcf06d 26499->26489 26500->26499 26502 bcf378 2 API calls 26500->26502 26503 bcf369 2 API calls 26500->26503 26501->26489 26502->26501 26503->26501 26505 bca328 2 API calls 26504->26505 26506 bcf381 26505->26506 26506->26495 26508 bca328 2 API calls 26507->26508 26509 bcf381 26507->26509 26508->26509 26509->26495 26510 56e88f8 26511 56e890f 26510->26511 26514 56e8940 26511->26514 26517 56e8db0 26514->26517 26515 56e8929 26518 56e8dde 26517->26518 26520 bc7e08 2 API calls 26518->26520 26521 bc62d4 2 API calls 26518->26521 26519 56e8e14 26519->26515 26520->26519 26521->26519 26530 bc7210 26531 bc722a 26530->26531 26534 bc6254 26531->26534 26533 bc723c 26535 bc625f 26534->26535 26538 bc6274 26535->26538 26537 bc73a5 26537->26533 26539 bc627f 26538->26539 26542 bc62a4 26539->26542 26541 bc7482 26541->26537 26543 bc62af 26542->26543 26544 bc62d4 2 API calls 26543->26544 26545 bc7582 26544->26545 26545->26541 26522 56e8470 26523 56e8487 26522->26523 26526 56e84b8 26523->26526 26528 bc7e08 2 API calls 26526->26528 26529 bc62d4 2 API calls 26526->26529 26527 56e84a1 26528->26527 26529->26527 26554 56e87b0 26556 bc62a4 2 API calls 26554->26556 26558 bc74d0 26554->26558 26555 56e87bd 26556->26555 26559 bc74e0 26558->26559 26560 bc62d4 2 API calls 26559->26560 26561 bc7582 26560->26561 26561->26555

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 193 6dd0d4c-6dd3461 198 6dd3467-6dd3497 193->198 199 6dd36c6-6dd3764 193->199 206 6dd349d-6dd34b0 call 6dd0d8c call 6dd0d9c 198->206 207 6dd3644-6dd3652 198->207 228 6dd37d7-6dd37f2 199->228 229 6dd3766-6dd37cb 199->229 219 6dd352a-6dd3577 206->219 220 6dd34b2-6dd34c9 call 6dd0dac 206->220 213 6dd3654-6dd3697 207->213 214 6dd36a0-6dd36c0 207->214 213->214 214->198 214->199 254 6dd3579-6dd3583 call 6dd0dbc 219->254 255 6dd35c8-6dd35f6 call 6dd0dcc 219->255 230 6dd34cb-6dd34df 220->230 231 6dd34f7-6dd3521 220->231 240 6dd37f4-6dd3804 228->240 241 6dd3806-6dd3808 228->241 229->228 385 6dd34e2 call 6dd4645 230->385 386 6dd34e2 call 6dd4641 230->386 387 6dd34e2 call 6dd4650 230->387 231->219 242 6dd380e-6dd3833 240->242 241->242 250 6dd3835-6dd3845 242->250 251 6dd3847-6dd3849 242->251 245 6dd34e8-6dd34f1 245->231 253 6dd384f-6dd3981 250->253 251->253 293 6dd3bcf-6dd3bea 253->293 294 6dd3987-6dd39a2 253->294 260 6dd3585-6dd359e 254->260 261 6dd35a0-6dd35ae 254->261 272 6dd35fb-6dd35fd 255->272 265 6dd35b7-6dd35c4 260->265 261->265 265->255 272->214 274 6dd3603-6dd3642 call 6dd0dcc 272->274 274->214 298 6dd3ce4-6dd3cff 293->298 299 6dd3bf0-6dd3cdf 293->299 294->293 297 6dd39a8-6dd3bca 294->297 305 6dd3e19-6dd40a8 297->305 303 6dd3d05-6dd3e15 298->303 304 6dd3e17 298->304 299->305 303->305 304->305 353 6dd40ae-6dd4211 305->353 354 6dd4213-6dd4225 305->354 357 6dd4228-6dd424e 353->357 354->357 360 6dd4255-6dd433e 357->360 361 6dd4250-6dd4254 357->361 375 6dd4345-6dd4377 360->375 376 6dd4340-6dd4344 360->376 361->360 381 6dd438f-6dd4396 375->381 382 6dd4379-6dd438a call 6dd0d5c 375->382 376->375 382->381 385->245 386->245 387->245
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.288496950.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6dd0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5432f2a46eada701f0ca52d02ce6601054dc4fd5f2e1d0cc0567ab56cf461af6
                                                      • Instruction ID: 7c5b922caa9b1c555c1a9464a0db3db95af27b8ce55e107dccef0fb60e66f1c7
                                                      • Opcode Fuzzy Hash: 5432f2a46eada701f0ca52d02ce6601054dc4fd5f2e1d0cc0567ab56cf461af6
                                                      • Instruction Fuzzy Hash: FDA21831D106198FCB15EF68C8947DDB7B2FF89304F1482AAD90AA7251EB70AE85CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 244f04139bb2abe52cba337f362e6e4478a78138752aca769045212b01c9607b
                                                      • Instruction ID: da7c86b32ad6471e81d05d3e499dd03128ba8aaa83b040b9f70db914598c8bbb
                                                      • Opcode Fuzzy Hash: 244f04139bb2abe52cba337f362e6e4478a78138752aca769045212b01c9607b
                                                      • Instruction Fuzzy Hash: 35D1F674E05618DFCB24CFA4D584B9DBBF2FB49300F2094AAD51AAB354DB70A985CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b478d3df73d546c34200daa2795301c83f359e811f77038d7a6f16671444345d
                                                      • Instruction ID: 2b23a060e2719dd532bd3b9a12a823273b6f2f225fa7f628c22a64a8fbb52a87
                                                      • Opcode Fuzzy Hash: b478d3df73d546c34200daa2795301c83f359e811f77038d7a6f16671444345d
                                                      • Instruction Fuzzy Hash: 48D10674E05618DFCB24CFA4D484B9DBBF2FB49300F2094AAD51AAB364DB34A985CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32 ref: 00BCC668
                                                      • GetCurrentThread.KERNEL32 ref: 00BCC6A5
                                                      • GetCurrentProcess.KERNEL32 ref: 00BCC6E2
                                                      • GetCurrentThreadId.KERNEL32 ref: 00BCC73B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Current$ProcessThread
                                                      • String ID:
                                                      • API String ID: 2063062207-0
                                                      • Opcode ID: 0351138a4c275e4bb4dc2015a029c710fe3cbd92a634b26d3833bd3af41c08f9
                                                      • Instruction ID: 39b3e75302e763d93ac1e5a653ef3017177a359e91dfe840930037a940fde5c8
                                                      • Opcode Fuzzy Hash: 0351138a4c275e4bb4dc2015a029c710fe3cbd92a634b26d3833bd3af41c08f9
                                                      • Instruction Fuzzy Hash: 045145B09006888FDB10CFA9D648BDEBFF1AF49318F2484AEE409A7351CB745884CF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 20 bcc608-bcc679 GetCurrentProcess 21 bcc67b-bcc681 20->21 22 bcc682-bcc6b6 GetCurrentThread 20->22 21->22 23 bcc6bf-bcc6f3 GetCurrentProcess 22->23 24 bcc6b8-bcc6be 22->24 26 bcc6fc-bcc714 23->26 27 bcc6f5-bcc6fb 23->27 24->23 38 bcc717 call bccfa0 26->38 39 bcc717 call bccbc1 26->39 27->26 30 bcc71d-bcc74c GetCurrentThreadId 31 bcc74e-bcc754 30->31 32 bcc755-bcc7b7 30->32 31->32 38->30 39->30
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32 ref: 00BCC668
                                                      • GetCurrentThread.KERNEL32 ref: 00BCC6A5
                                                      • GetCurrentProcess.KERNEL32 ref: 00BCC6E2
                                                      • GetCurrentThreadId.KERNEL32 ref: 00BCC73B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Current$ProcessThread
                                                      • String ID:
                                                      • API String ID: 2063062207-0
                                                      • Opcode ID: d258694ccb5198147311da86e2249031a94a58783bd6696c734916274735fe85
                                                      • Instruction ID: 6e9f19971eb66535e47d49e5855fe9ff9ade5d6574eb976607ec563fb27e583f
                                                      • Opcode Fuzzy Hash: d258694ccb5198147311da86e2249031a94a58783bd6696c734916274735fe85
                                                      • Instruction Fuzzy Hash: 425126B09006498FDB14CFA9D648BDEBBF1EF49318F20846AE419B7350DB746984CF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 40 bca328-bca33d call bc9690 43 bca33f 40->43 44 bca353-bca357 40->44 93 bca345 call bca5b0 43->93 94 bca345 call bca5a0 43->94 45 bca359-bca363 44->45 46 bca36b-bca3ac 44->46 45->46 51 bca3ae-bca3b6 46->51 52 bca3b9-bca3c7 46->52 47 bca34b-bca34d 47->44 50 bca488-bca548 47->50 88 bca54a-bca54d 50->88 89 bca550-bca57b GetModuleHandleW 50->89 51->52 54 bca3c9-bca3ce 52->54 55 bca3eb-bca3ed 52->55 57 bca3d9 54->57 58 bca3d0-bca3d7 call bc969c 54->58 56 bca3f0-bca3f7 55->56 59 bca3f9-bca401 56->59 60 bca404-bca40b 56->60 63 bca3db-bca3e9 57->63 58->63 59->60 64 bca40d-bca415 60->64 65 bca418-bca421 call bc96ac 60->65 63->56 64->65 70 bca42e-bca433 65->70 71 bca423-bca42b 65->71 73 bca435-bca43c 70->73 74 bca451-bca455 70->74 71->70 73->74 75 bca43e-bca44e call bc96bc call bc96cc 73->75 95 bca458 call bcaca8 74->95 96 bca458 call bcac98 74->96 75->74 77 bca45b-bca45e 80 bca460-bca47e 77->80 81 bca481-bca487 77->81 80->81 88->89 90 bca57d-bca583 89->90 91 bca584-bca598 89->91 90->91 93->47 94->47 95->77 96->77
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00BCA56E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: 5ff885076596e305f5c17b51ddf61851a572e46d0279d64640f9c66415dc2331
                                                      • Instruction ID: 91a6a27713b5b827ed738da9a3ddfda8b461487e442856cb84fa581d699353ca
                                                      • Opcode Fuzzy Hash: 5ff885076596e305f5c17b51ddf61851a572e46d0279d64640f9c66415dc2331
                                                      • Instruction Fuzzy Hash: A7712570A00B098FDB24DF29D055B9AB7F1FF88308F00896DD45AD7B50D775E9498B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 97 bcab6d-bcabd0 99 bcabd8-bcac07 LoadLibraryExW 97->99 100 bcabd2-bcabd5 97->100 101 bcac09-bcac0f 99->101 102 bcac10-bcac2d 99->102 100->99 101->102
                                                      APIs
                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00BCA5E9,00000800,00000000,00000000), ref: 00BCABFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: f3c53f1cac97ecfe12dcc9ce297bdaf536948f6ba24992eb6490f6240032d69b
                                                      • Instruction ID: 708f29af479891f7362b71c7a8f4bc336afc670af558fc43492919e0607cb968
                                                      • Opcode Fuzzy Hash: f3c53f1cac97ecfe12dcc9ce297bdaf536948f6ba24992eb6490f6240032d69b
                                                      • Instruction Fuzzy Hash: D72125B28043888FCB11CFA9C444AEEBFF5EB49224F04845ED455A7611C375A949CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 105 bccc30-bccc35 106 bccc38-bccccc DuplicateHandle 105->106 107 bcccce-bcccd4 106->107 108 bcccd5-bcccf2 106->108 107->108
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BCCCBF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 8592270883d1695d3907c43995b80a8880b95912ad7ea214c0ddd9cc48459c02
                                                      • Instruction ID: 35135fe83a4a36ff0003f8255df0d2a5e862ee8849602fa1244542d3797ee78d
                                                      • Opcode Fuzzy Hash: 8592270883d1695d3907c43995b80a8880b95912ad7ea214c0ddd9cc48459c02
                                                      • Instruction Fuzzy Hash: 912103B5D00248AFDB10CFAAD885ADEBFF5FB48324F14841AE819A3710D374A944CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 111 bccc38-bccccc DuplicateHandle 112 bcccce-bcccd4 111->112 113 bcccd5-bcccf2 111->113 112->113
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00BCCCBF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 29e937297482973df52c2a0cdb346623fcd8a7051a9546bd6a954a48b57ac18a
                                                      • Instruction ID: 0a0628bf542a87ff86ae62f1ae9f8ebdad347242a93323c5ccc82bf276b51cc5
                                                      • Opcode Fuzzy Hash: 29e937297482973df52c2a0cdb346623fcd8a7051a9546bd6a954a48b57ac18a
                                                      • Instruction Fuzzy Hash: DC21C4B59002489FDB10CFA9D584ADEBFF5EB48324F14845AE959A3710D374A944CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 116 bc96f8-bcabd0 118 bcabd8-bcac07 LoadLibraryExW 116->118 119 bcabd2-bcabd5 116->119 120 bcac09-bcac0f 118->120 121 bcac10-bcac2d 118->121 119->118 120->121
                                                      APIs
                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00BCA5E9,00000800,00000000,00000000), ref: 00BCABFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 0a9b0f71b7b5e359e7eb3dfc5e534c4772d964e4f3362175a26a474c547f41a9
                                                      • Instruction ID: 858eef27c5d0dc92ad5302ee39f0510c1e01e8a314a090352334a627032dcaa0
                                                      • Opcode Fuzzy Hash: 0a9b0f71b7b5e359e7eb3dfc5e534c4772d964e4f3362175a26a474c547f41a9
                                                      • Instruction Fuzzy Hash: F81103B6D003489FCB10CF9AC484BEEBBF5EB48324F14846EE819A7610C375A945CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 124 56edcd4-56ef54e 127 56ef55a-56ef57a call 56eac2c 124->127 128 56ef550-56ef559 124->128 131 56ef678-56ef6a8 127->131 132 56ef580-56ef591 call 56eb528 call 56edcd4 127->132 136 56ef6aa-56ef6d0 call 56edf2c 131->136 137 56ef65b-56ef662 call 56eeb58 131->137 140 56ef597-56ef61c call 56edefc call 56edf0c call 56edf1c call 56ef11c 132->140 141 56ef6d5-56ef6d7 136->141 137->131 163 56ef61e 140->163 164 56ef627 140->164 145 56ef6d9-56ef6f4 call 56ef12c 141->145 146 56ef6f5-56ef71b 141->146 159 56ef71d-56ef721 146->159 160 56ef722-56ef790 call 56ef13c 146->160 172 56ef79f-56ef7a7 160->172 173 56ef792-56ef796 160->173 163->164 164->137 174 56ef7ae-56ef808 172->174 173->174 175 56ef798-56ef79e 173->175 179 56ef80a-56ef812 174->179 180 56ef814-56ef843 174->180 179->180 182 56ef84c-56ef869 180->182 183 56ef845-56ef84b 180->183 183->182
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: <ok
                                                      • API String ID: 0-1043059258
                                                      • Opcode ID: 026e665c7c1a786bfea3f0800770f14064e2c8231f50e97aa1f39ef68dfb9d7a
                                                      • Instruction ID: 17712fed93c25b19f6d3f75402f8000ec49781345e68f87aa348aa1f84e47352
                                                      • Opcode Fuzzy Hash: 026e665c7c1a786bfea3f0800770f14064e2c8231f50e97aa1f39ef68dfb9d7a
                                                      • Instruction Fuzzy Hash: 7E910F70A06348DFCB04DFA5E8486AEFBF6FF85314F10846AE446A7751DB34A846CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 187 bca508-bca548 188 bca54a-bca54d 187->188 189 bca550-bca57b GetModuleHandleW 187->189 188->189 190 bca57d-bca583 189->190 191 bca584-bca598 189->191 190->191
                                                      APIs
                                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00BCA56E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: HandleModule
                                                      • String ID:
                                                      • API String ID: 4139908857-0
                                                      • Opcode ID: 8cf2e4b244ce551ca28c216dd2f6a77e14026d5a96328381585c9fbd9257d692
                                                      • Instruction ID: 354824b119730f151e1ba1350eb6196dabecc5b0efedc37e6b33db99d598bc5a
                                                      • Opcode Fuzzy Hash: 8cf2e4b244ce551ca28c216dd2f6a77e14026d5a96328381585c9fbd9257d692
                                                      • Instruction Fuzzy Hash: 3211DFB6C006498FCB10CF9AC444BDEFBF5EB88328F14855AD829A7610D378A545CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ed0173cf5b6339c9e70f0de04e1ed484f3487d8a921552714f03c1a31260728c
                                                      • Instruction ID: 3311ef3f4f582b2506f552336964a503154364f2786156db5b7606c4eb84b2d1
                                                      • Opcode Fuzzy Hash: ed0173cf5b6339c9e70f0de04e1ed484f3487d8a921552714f03c1a31260728c
                                                      • Instruction Fuzzy Hash: B2818B70E002198FCF14DFA9C9546EEBBB6FF89304F14852AE409AB750DB385946CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 33017afe89ef97aeda4e8fbb3b9f6f538392cc73f9340575ce916b35910f0d74
                                                      • Instruction ID: 2f187191427af29f42d4e6096b3958f8c83bd394a05c0fc9e6dd478716366f35
                                                      • Opcode Fuzzy Hash: 33017afe89ef97aeda4e8fbb3b9f6f538392cc73f9340575ce916b35910f0d74
                                                      • Instruction Fuzzy Hash: 9551337070224A8FCF15ABA8C4155AF7BBBEFC5244B10806DE406DB791CF348C0AC7A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 53e10c32cd6ab0196997c50366a40308c2764c5cd6497627201fc6667156c142
                                                      • Instruction ID: 282234079c3d4f668077201f682ab3c2d96a8f3ee116c2c48e0fc6e6ef5f37cb
                                                      • Opcode Fuzzy Hash: 53e10c32cd6ab0196997c50366a40308c2764c5cd6497627201fc6667156c142
                                                      • Instruction Fuzzy Hash: E3619D31A0170ADFCB00DF64D458AAEB7B6FF85304F10855AE516AB360EB70AD96CB80
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c192a1f23d52aa57e0c1aabcdc47b69e58967824886cc4947a9817f5d9a12c10
                                                      • Instruction ID: 7a5cabff0f00401f25fc391b6ee07ade8f85d8b9d30a1805c873a169b6c02897
                                                      • Opcode Fuzzy Hash: c192a1f23d52aa57e0c1aabcdc47b69e58967824886cc4947a9817f5d9a12c10
                                                      • Instruction Fuzzy Hash: 765171B1E022499FCB10DFA9C908AEFBBF9EF88214F10841ED415E7750EB749905CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e8dabbd0a641343c85c66671b49940f9d2207132be2910902cf33ff74ae41358
                                                      • Instruction ID: 99d7603dde7c5fb94b998e0b6c06a9ddae49708fba3ebeead078ff7b799fb678
                                                      • Opcode Fuzzy Hash: e8dabbd0a641343c85c66671b49940f9d2207132be2910902cf33ff74ae41358
                                                      • Instruction Fuzzy Hash: 07418A75E022048FDF24EFF4C55C6ED76B2EB89354F144529D002AB344DB3A49C6CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1d9a8d45bf5c353b8da412b5bbd9916390000edd6ab19f33be71bc41c8e937c1
                                                      • Instruction ID: 935c74900df3e2a86c36a47960f68683094ab0aa45b64a125d8577ff6c8c47dc
                                                      • Opcode Fuzzy Hash: 1d9a8d45bf5c353b8da412b5bbd9916390000edd6ab19f33be71bc41c8e937c1
                                                      • Instruction Fuzzy Hash: 7941E2B1D01619DBDB10DFA9C584ADEFBB5BF48304F248529D409BB310D775AA4ACF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c8ca6241ae54c0c8b9056a326603b256d67fa0567308f8a6143edd280ecbaa48
                                                      • Instruction ID: 565fc59edc0a776d5b9e340eb26c7cf689dff3b2cdd28c7fcac7faa152e28c82
                                                      • Opcode Fuzzy Hash: c8ca6241ae54c0c8b9056a326603b256d67fa0567308f8a6143edd280ecbaa48
                                                      • Instruction Fuzzy Hash: 3241AEB0D017589FDB14CFAAC884ADEFBB6BF48314F24852AE418AB254D7756885CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3dbb0646a004251fce08667513541618b8040e3bd432e1be910d751def5cba73
                                                      • Instruction ID: 4655de18a41c350e9c00a73a10cc5108774b93719ff19b698a9f07cbfa67e190
                                                      • Opcode Fuzzy Hash: 3dbb0646a004251fce08667513541618b8040e3bd432e1be910d751def5cba73
                                                      • Instruction Fuzzy Hash: 36210F71A052448FCB01EF79C54449FBBE6EF81219709886ED40ADB751EF35ED09CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: de5f4522ee28ee085d9fdd449627e01da6cbab3320347e21adc8d220b1ea0409
                                                      • Instruction ID: 204b98596238ab3029e0e9100d804cdfbfaaeb083813aa92ba428c5274b97182
                                                      • Opcode Fuzzy Hash: de5f4522ee28ee085d9fdd449627e01da6cbab3320347e21adc8d220b1ea0409
                                                      • Instruction Fuzzy Hash: 2E21DF72616B049BE320DF28D846A1AB7F2FB84350F040E29E1A6CBB51D734E808CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 69029e0921788fb49a1bef001a8b3412d056bbd646563174c92c8498a820ebc4
                                                      • Instruction ID: c38588b3b7282991b22506bd9e8adedce0e9f32bf460f4f38c41fa2c92b828dc
                                                      • Opcode Fuzzy Hash: 69029e0921788fb49a1bef001a8b3412d056bbd646563174c92c8498a820ebc4
                                                      • Instruction Fuzzy Hash: 1721F1B1504340EFDB25CF50D8C0BAABB75FB88315F248669EC050B646C336D85ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 771b902c4b23b120c1d9df3e90db531bd41120d4440848283f5a5915d9c63de8
                                                      • Instruction ID: ab4b976d902dd7dd10f2ee3e2c520e6c314b39cc286dfdf9a7574eef323d8ae3
                                                      • Opcode Fuzzy Hash: 771b902c4b23b120c1d9df3e90db531bd41120d4440848283f5a5915d9c63de8
                                                      • Instruction Fuzzy Hash: B22125B1504240EFDB25CF14D9C0B6ABF75FB98329F248569ED094B216D336D84DCBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272232675.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8944ed9cfa6db1985cfd149f13ab2ec68cf9e15e1a9b5a8214be534cb215bfe9
                                                      • Instruction ID: 03620f8723420b09f91217fef7788ba9b758c782acb17814bc16870dcd1165f5
                                                      • Opcode Fuzzy Hash: 8944ed9cfa6db1985cfd149f13ab2ec68cf9e15e1a9b5a8214be534cb215bfe9
                                                      • Instruction Fuzzy Hash: 652129B5A04240EFDB01CF20D9D0B66BB75FB84358F24C96DE8094B741C336D84ACB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272232675.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 9b3371332a8a38e431a11e62c7ca5ccbd0a6e1dbfebe9ad9af32f2a152c71326
                                                      • Instruction ID: 8d5a243fbba5d259703b19c8d97162776c4d0f8f0ddbd868d599445e0db8af99
                                                      • Opcode Fuzzy Hash: 9b3371332a8a38e431a11e62c7ca5ccbd0a6e1dbfebe9ad9af32f2a152c71326
                                                      • Instruction Fuzzy Hash: 5021F575A04240EFDB14CF10D9C4B26BB75FB84358F24C96DE80A4B746C33BD846CAA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e6c711e3533947179f7f7ae92d7e31a875699e0e2ba27df89c40f2356ba43de4
                                                      • Instruction ID: 4c2ab1e0618e379c296ba50b82b10f0ab3af891e543655eb9aca34d7348ff3bb
                                                      • Opcode Fuzzy Hash: e6c711e3533947179f7f7ae92d7e31a875699e0e2ba27df89c40f2356ba43de4
                                                      • Instruction Fuzzy Hash: 3421B176504280DFDB16CF50D9C4B5ABF72FB84314F24C6A9DC484B656C33AD85ACBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction ID: cda7e886cd39daff0708ea49a16c811c93a662bd44b075d84a93174ccba5863a
                                                      • Opcode Fuzzy Hash: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction Fuzzy Hash: 2611B176404280DFDB16CF14D5C4B56BF71FB94324F24C6A9DD054B616C336D85ACBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 55c66364523382034d75a2a30424dedaf4b43c1f019b746efa3a881eed0eaed2
                                                      • Instruction ID: 2490d4eff66d89105756d910092e34f8ecf43d03b60b24c42c96969a9d985c56
                                                      • Opcode Fuzzy Hash: 55c66364523382034d75a2a30424dedaf4b43c1f019b746efa3a881eed0eaed2
                                                      • Instruction Fuzzy Hash: E8015E7030B2009FDB24ABB58544BAA77DAAF45744F0444AEA90EC6B80EF35D902C795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272232675.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4af9a06ffb61d74dcaa5232f3e705a97e1126696a135aabd0f2606d4194c68c
                                                      • Instruction ID: 509164bcda61045c2ad41405f2d6d9b4775dd851c043a1b6269233f9def68905
                                                      • Opcode Fuzzy Hash: a4af9a06ffb61d74dcaa5232f3e705a97e1126696a135aabd0f2606d4194c68c
                                                      • Instruction Fuzzy Hash: 56119075904280DFDB11CF14D5C4B15FB71FB84318F24C6ADD84A4B656C33AD84ACB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272232675.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a4af9a06ffb61d74dcaa5232f3e705a97e1126696a135aabd0f2606d4194c68c
                                                      • Instruction ID: ca10c04f0c21ce4fe5c7d7dfbb0f3f5f6958644cf20135a241e3a690c1286611
                                                      • Opcode Fuzzy Hash: a4af9a06ffb61d74dcaa5232f3e705a97e1126696a135aabd0f2606d4194c68c
                                                      • Instruction Fuzzy Hash: AE119DB5A04280DFDB12CF20D5D4B55FBB1FB84324F28C6ADD8494B656C33AD84ACB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 719a098bafb9f360531ad14e74a7c2df685b66eb97decdff407cc1b835ea44e4
                                                      • Instruction ID: bcfa572739589bce3e7bd09430053b7172c7e3616b31e3538b50dd6f96dd5cd5
                                                      • Opcode Fuzzy Hash: 719a098bafb9f360531ad14e74a7c2df685b66eb97decdff407cc1b835ea44e4
                                                      • Instruction Fuzzy Hash: D41123B1C016488FCB50CF9AC444BDEFBF8EB88224F14842AE859B3710D374A945CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: cc4fcedd4336bd91e924ce5e09eb23d2d6f3d3612b6b18c85c96675048f71d73
                                                      • Instruction ID: 22dfaca3ad3688b2b2d8887240d4fa96d8112c7039c0b87768fed40de41986e7
                                                      • Opcode Fuzzy Hash: cc4fcedd4336bd91e924ce5e09eb23d2d6f3d3612b6b18c85c96675048f71d73
                                                      • Instruction Fuzzy Hash: F61112B1C046488FCB50CF9AC444B9EFBF8EB48224F14842AE859A3710D374A945CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 37be5a947b967dbbaf624724619041f58cc52b8b3935661e14afd2f446d7f500
                                                      • Instruction ID: fe4a5faeaec5a97153c38a63e6f161a8f12abe1c60f0964c4d2a3efb12663e6e
                                                      • Opcode Fuzzy Hash: 37be5a947b967dbbaf624724619041f58cc52b8b3935661e14afd2f446d7f500
                                                      • Instruction Fuzzy Hash: E51122B59016488FCB20DF99D488BDEFBF8EB48324F10845AE919A7700C374A948CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ef1d4daa2d758732f95d25b660d20a544889bd88acdc08c049098659393db49f
                                                      • Instruction ID: 63ef2b67b6a481d34e42c8c8e5fd8df49a9476c61aec1da813f200599f1479d8
                                                      • Opcode Fuzzy Hash: ef1d4daa2d758732f95d25b660d20a544889bd88acdc08c049098659393db49f
                                                      • Instruction Fuzzy Hash: AD01B5303003105BE750AB68D416B9A72C6AB85708F10855DE48A8F7C7CFF66C8A87D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: bee63dbf7305a9ff754d8363f8cc8609a571804f71da8db28b630a3c49fd67f8
                                                      • Instruction ID: f9609a6d86c7471572a3b655bf71c95f7bce105cde4ac71d23387d65af948306
                                                      • Opcode Fuzzy Hash: bee63dbf7305a9ff754d8363f8cc8609a571804f71da8db28b630a3c49fd67f8
                                                      • Instruction Fuzzy Hash: 4E0147750043C09AE7308B25CC84BAABBA8FF49339F18845AED041A642D378984CC6B1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b049099bbbe3e50b733575c03e985f2857bcfe899de2fe666c4400d0f750b6fc
                                                      • Instruction ID: 67610a86ab6739fc7da4706aad4c8f81a6ac998ed665408dbeb4a2ccc759e10a
                                                      • Opcode Fuzzy Hash: b049099bbbe3e50b733575c03e985f2857bcfe899de2fe666c4400d0f750b6fc
                                                      • Instruction Fuzzy Hash: FC010431602B449BD724DF38D485A67B7F6FB85395B040E2AE096CBB44DB70E809CBD0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eb39f9a6d3486d4bf385d7194c5c7230a198392b0255cf70594ecb4e8f25e9bd
                                                      • Instruction ID: 29a85a16140c4689acbccc305f5f028b8b64e87606d59f7e7b30836eccdd10e9
                                                      • Opcode Fuzzy Hash: eb39f9a6d3486d4bf385d7194c5c7230a198392b0255cf70594ecb4e8f25e9bd
                                                      • Instruction Fuzzy Hash: 5F116130202B9096D760AB78C414BCB77D6BF41308F004D1EE0DA1F796C7F6384887A1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 01d788a6b183309d7cc7fda6401637dd827b3dc75a4027dfba632c16edf18a74
                                                      • Instruction ID: ee660934f7ee3b01049c326e071f11d23b0a9c2f3c2391a813c257d8050b9f85
                                                      • Opcode Fuzzy Hash: 01d788a6b183309d7cc7fda6401637dd827b3dc75a4027dfba632c16edf18a74
                                                      • Instruction Fuzzy Hash: 59F09071B021145F8F16A7A898558FEBABEEBC8A50B10002DE605A7380DA710E02C7EA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272204205.0000000000A5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A5D000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_a5d000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2f9cb276fdecf832eed67a5cae5708fc598151a2aa87e87e9591fc3fb40d58a5
                                                      • Instruction ID: efba53e4139565da2ac127e91d39ceff8fd00f8707be79d0af360b95e5ef8dd1
                                                      • Opcode Fuzzy Hash: 2f9cb276fdecf832eed67a5cae5708fc598151a2aa87e87e9591fc3fb40d58a5
                                                      • Instruction Fuzzy Hash: 62F062714047849FEB208F15CC88B66FBA8EB55774F18C45AED085B686D3799C48CAB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5768bec58f357302b18a2c854647e5cf1b4b16f7c9921d88e39b18c22187c396
                                                      • Instruction ID: 63e905526f107306f6b13139dca5b711b5684f31e1dae767fc010bd60e440522
                                                      • Opcode Fuzzy Hash: 5768bec58f357302b18a2c854647e5cf1b4b16f7c9921d88e39b18c22187c396
                                                      • Instruction Fuzzy Hash: 38F0A03030062017EB1477688416F6A32CFAFC4B24F10816EB1968FBC6CEF69C424BE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e6913536b6b15b7934bb605264e26eb4bd56a7ebc7bec6654aa3a838dc08f874
                                                      • Instruction ID: 93ab21789b4d3cc076c8f49dabfd6ccf856fa12ae74d500e65ab8ed7b207eaa4
                                                      • Opcode Fuzzy Hash: e6913536b6b15b7934bb605264e26eb4bd56a7ebc7bec6654aa3a838dc08f874
                                                      • Instruction Fuzzy Hash: 3EF0E5367001642B8F04EAB9D5555AFB39BEBC6258B00893AD81DCB740DF74AD4587E1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3d10448df40cfddb6d6a952c303100f56ea76e0943d76f4986549a9a3929210d
                                                      • Instruction ID: d66b15c11af7216c26b1bbd66e13dd559edf720c100de29e8d2cb2a9823c4817
                                                      • Opcode Fuzzy Hash: 3d10448df40cfddb6d6a952c303100f56ea76e0943d76f4986549a9a3929210d
                                                      • Instruction Fuzzy Hash: 20F082353046108FCB14EF5AD45495AB3EABFCA611715449AE401C7775CA60EC45CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1a17d40e5c85f309305a2511431f00ffda805dc28795ae0958e78abff07a1b08
                                                      • Instruction ID: 982277d6b65c881d87ec4eb06c5a9fa8ff1e3919f1a0cc5043dedcfa92dfe74d
                                                      • Opcode Fuzzy Hash: 1a17d40e5c85f309305a2511431f00ffda805dc28795ae0958e78abff07a1b08
                                                      • Instruction Fuzzy Hash: A2F0FF31E126028BD35CDF6CE442A16BBE5FB05310B550AA6E068CF782D721E8C1CBE2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 44029294e01d0948f01e61b136231289f49efcadf1513f65722cf95b3c1f272b
                                                      • Instruction ID: 000c05b8c8a5449350d9c00cf8f35d6d8e3dbef786be8cc8684b3d566db41067
                                                      • Opcode Fuzzy Hash: 44029294e01d0948f01e61b136231289f49efcadf1513f65722cf95b3c1f272b
                                                      • Instruction Fuzzy Hash: 2E019374A401188FD758DF28C8989A9B7F1FF4A311F5094E5A60AA7261DB309E82CF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c5a2a8ec1e42b9958c4603e9be75e36ac3cdb5a36a3b6f4df5c352b47208c7a2
                                                      • Instruction ID: 7c1057371e52b654e821b7e46004885cf1698ad17a9a77e16c21124a8c4dedc5
                                                      • Opcode Fuzzy Hash: c5a2a8ec1e42b9958c4603e9be75e36ac3cdb5a36a3b6f4df5c352b47208c7a2
                                                      • Instruction Fuzzy Hash: CE019034A401198FCB68DF24D998AACB7B1FF48311F1084E9DA0AA7765DB306EC2DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fdf1c315668cacd86833bb6212e7a644547eccc1c61698b670a4c389fbcaf94d
                                                      • Instruction ID: c037749063bf9d764300b496a2f7e31bf8b98997eede90b74b6c66307906c936
                                                      • Opcode Fuzzy Hash: fdf1c315668cacd86833bb6212e7a644547eccc1c61698b670a4c389fbcaf94d
                                                      • Instruction Fuzzy Hash: C2F01C706117049B8B58DF28D45599977E5FB4A2183348AAEE029CF756EB72E803CBC4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1671971d8b63fa1aac952a914d762d6d80627b68ce8c2fa50deb589b4ae719f7
                                                      • Instruction ID: e6da4d9974a17a7810e39022c26b8f18c9cdc3baaadafbdf4d2d1c06e9ccabdc
                                                      • Opcode Fuzzy Hash: 1671971d8b63fa1aac952a914d762d6d80627b68ce8c2fa50deb589b4ae719f7
                                                      • Instruction Fuzzy Hash: 98F065307406548BEB05B778D455B9A36D6AFC5718F0444ADE04A8B396CEF66C4087E1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dc28bce3bbad846f0551195c681192193ca092d4af0060e69e6b4e5d30f7021d
                                                      • Instruction ID: 97b133d97f96739fb8075393c1e4d99d68e4fcbc83aeca73e20248efda2e9724
                                                      • Opcode Fuzzy Hash: dc28bce3bbad846f0551195c681192193ca092d4af0060e69e6b4e5d30f7021d
                                                      • Instruction Fuzzy Hash: A601AF38E406188FCB69CF64C988AA9B7B5FF49305F1455E9E90DAB320D730AE81CF40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b69f0734d3a2fcd9673e95ff50d241d8d1b773a6f8aa7416531c729db36ada4c
                                                      • Instruction ID: 67f0b617983115bb15f95320b8f68f3509589b58cce31a2d64ceb98079b77b13
                                                      • Opcode Fuzzy Hash: b69f0734d3a2fcd9673e95ff50d241d8d1b773a6f8aa7416531c729db36ada4c
                                                      • Instruction Fuzzy Hash: 25F03734E10619CFC704DBA0DC48999B7B1BF89341F104696E00AAB2A1EB706AC5CA50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 212914ba05afc68c16428657a1a653f2933ba90c9865c083eb9730c1a24d953f
                                                      • Instruction ID: 84be2a69e09e19923029824b4186e25ef6cb0c202737b5f54f47c8e647d77755
                                                      • Opcode Fuzzy Hash: 212914ba05afc68c16428657a1a653f2933ba90c9865c083eb9730c1a24d953f
                                                      • Instruction Fuzzy Hash: 9AF0F930D106598FC718DF64CD486AEB7B1FF45341F105696D046B72A0EB70AAC1CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b43bc8b73c0e2f6d6c53738f5e8e6908ede5c9ada33e4ac362537bb4d6860e3d
                                                      • Instruction ID: 3a91076de0cdb445ab3321434116f3d0d86908f561cea33dc399fdc74b8b67a2
                                                      • Opcode Fuzzy Hash: b43bc8b73c0e2f6d6c53738f5e8e6908ede5c9ada33e4ac362537bb4d6860e3d
                                                      • Instruction Fuzzy Hash: C7E0D8311021997BCB419F59D8009DF3F9DAF59215B008841F91486112C376D922D7F4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1a862952dd4132bf581e65a4d2bd9ae0c85fcff889d9eab42084c806b3f17540
                                                      • Instruction ID: 244e91f252f5fb23254624bc989ac75b73892a2ee14572c9362eb0614c592dc2
                                                      • Opcode Fuzzy Hash: 1a862952dd4132bf581e65a4d2bd9ae0c85fcff889d9eab42084c806b3f17540
                                                      • Instruction Fuzzy Hash: A7E0172035422423FA0832A85862F6E12CB9FC4B19F1080AEF9069F7CBCCE69C010BE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 49f066f3df61139eb4a06bad80417d3b78e1324af82e006675526c38c553060d
                                                      • Instruction ID: 1dd510db75d0e193ad79498d14aee14b08d335a7ecae5037f17171f03c1dfc14
                                                      • Opcode Fuzzy Hash: 49f066f3df61139eb4a06bad80417d3b78e1324af82e006675526c38c553060d
                                                      • Instruction Fuzzy Hash: F4E02272E102428FC340CE64CA559EAFBB1FBA6270F082E96800697110FB315E83CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c20737d46d0ce158e9e13daa2d11940ab39c46f05887ec00723fe0c44f1c7a2d
                                                      • Instruction ID: e5111c044adbf917ecdc69ecd480e9643a604e027526d06e1fd3a69da42f43ec
                                                      • Opcode Fuzzy Hash: c20737d46d0ce158e9e13daa2d11940ab39c46f05887ec00723fe0c44f1c7a2d
                                                      • Instruction Fuzzy Hash: E3F0A030808609DACB14EB64C9454DDBB71FF45310F0056ABD45626580F7305A90DA60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 854011e5ad5d40783f32b15ee6e1f8c78323231096b98c21e6538754fa29274a
                                                      • Instruction ID: 4faef538b784d1a8fc52f8d65602f120bf93694231083c6c6cafb724ad56bceb
                                                      • Opcode Fuzzy Hash: 854011e5ad5d40783f32b15ee6e1f8c78323231096b98c21e6538754fa29274a
                                                      • Instruction Fuzzy Hash: 4CE04F34611208EF8B00EFB4E94685CB7B9EB45314B10509AD80497318DF325E009B91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6499bb718f1ecf5e0dd422f390d869d467d9a387037d4b745187ea5956bc0ee1
                                                      • Instruction ID: 50dedd8833c7dc81331d2992eb689b8d43c664393972fc88eb66997e17996592
                                                      • Opcode Fuzzy Hash: 6499bb718f1ecf5e0dd422f390d869d467d9a387037d4b745187ea5956bc0ee1
                                                      • Instruction Fuzzy Hash: C5E01270E16208AFC750EFF8D8582DDBBF4EB48304F5041A9C909E7750EB711A46C791
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e308e760e04fd3dee77a469f31af6328ee502b016baa55bfa223358c467fc6aa
                                                      • Instruction ID: 491aed2af61e87dff01e8e3055891e148939127e65e5be8244d3e38b40de258f
                                                      • Opcode Fuzzy Hash: e308e760e04fd3dee77a469f31af6328ee502b016baa55bfa223358c467fc6aa
                                                      • Instruction Fuzzy Hash: 9EE0EC70905208ABDB80EFF898586DDBBF4EB44308F5042A9D809D3750EB306A45C792
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1c99fc951e58726c0b27cd7380f4ce381d49ee00a4574e03b72a97017429070c
                                                      • Instruction ID: 0135e4aa3ac6e241cd7f46718d422b5597dd0e9eb43785e45477198ba7dc4625
                                                      • Opcode Fuzzy Hash: 1c99fc951e58726c0b27cd7380f4ce381d49ee00a4574e03b72a97017429070c
                                                      • Instruction Fuzzy Hash: C7E0EC709062089FCB90FFF899592DDBBB4AB44304F6041A9C809E3750EB301A86CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c94b2a765efe7fadd70073f3f49e51c204f114577f7552e5100805e6c5ea90d2
                                                      • Instruction ID: 444866b3e17188545f04810c2a183e09672342c5e89cef7689b6d08b65ec3722
                                                      • Opcode Fuzzy Hash: c94b2a765efe7fadd70073f3f49e51c204f114577f7552e5100805e6c5ea90d2
                                                      • Instruction Fuzzy Hash: 64E0EC70D052089FCB80EFFC99596EDBBF5BB48304F5041A9C80997750EB301A46C792
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 99a91225162db549cf906bcb1694f18d8ac629b76528d5ea65882097f1108e3a
                                                      • Instruction ID: 2de275a21b3b1aa1155cd1949a9bc4c9a3329eb47aa7d55ad2dac4aed49dfb1d
                                                      • Opcode Fuzzy Hash: 99a91225162db549cf906bcb1694f18d8ac629b76528d5ea65882097f1108e3a
                                                      • Instruction Fuzzy Hash: 25D0A93330021CAB4F4666E4A518CDEBBDBAB89610700802BE2068B320DE29ED54E7E4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ab15448ebf812c887d3a7ea731da376f47f02b991e8e51bc53ff37c4e1aa4402
                                                      • Instruction ID: f1020a2765362bf59a02f6440c261e7a65876a4319391767bb54f8dfd19dbd21
                                                      • Opcode Fuzzy Hash: ab15448ebf812c887d3a7ea731da376f47f02b991e8e51bc53ff37c4e1aa4402
                                                      • Instruction Fuzzy Hash: D8E07574D05616CFCB68CF64CA58AAEF7B1BF4C301F1405E5D509A7615D734AE819F40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a67f20976e7b0e0871522c33485bc6d9e10a0104e1308039a9d82b9313e8058c
                                                      • Instruction ID: 48e52d6e8f316b90c1fd14fdaacc0487d7a3777b37d48ab07e2b9995121c4785
                                                      • Opcode Fuzzy Hash: a67f20976e7b0e0871522c33485bc6d9e10a0104e1308039a9d82b9313e8058c
                                                      • Instruction Fuzzy Hash: D3E0BF74A001198FC718DF55C6985ADBBF5FF49300F1055A59509A7265E7309D41CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e7daa8d7167d8da4b814836b60be6f0416a19cb38997ac7b7dc56d586ce3ad95
                                                      • Instruction ID: b3df7965b6ce01163010375a5e9d7ec89e7b0c3b56b74bbe188519946f1ed5fd
                                                      • Opcode Fuzzy Hash: e7daa8d7167d8da4b814836b60be6f0416a19cb38997ac7b7dc56d586ce3ad95
                                                      • Instruction Fuzzy Hash: 48E0B638A141558FC718CF65D9889ADB7F2FF89350F1499A9951AAB220DB709E81CF00
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.284937728.00000000056D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056D0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_56d0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8aa39f7fccee3c2b9294184ed10dd199f9a06b3bd434d3a69fb55de05617c828
                                                      • Instruction ID: a10906746c9c05554a605729c393be89b947eae68a8cf9c9c570c1ee5f1053e9
                                                      • Opcode Fuzzy Hash: 8aa39f7fccee3c2b9294184ed10dd199f9a06b3bd434d3a69fb55de05617c828
                                                      • Instruction Fuzzy Hash: 90D01230D05206CFCB04CF50C9041ADF7F1FB95320F1069569115A6180E77546818AD9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3c9302d850bca6c1ee472d9c50f37b1108ea05489bdc1488135dd7535f7b9539
                                                      • Instruction ID: da4d59e1c095ef5b6d8c13ab6535d80c3e10728454f75b8724d79d02c3d60325
                                                      • Opcode Fuzzy Hash: 3c9302d850bca6c1ee472d9c50f37b1108ea05489bdc1488135dd7535f7b9539
                                                      • Instruction Fuzzy Hash: 4812D3B1413F668BE310CF65EC983AD3BA1B745329B90430BD2691EAF4D7B8014AEF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8d32c33988476ada0362789829da53345387b3dd7626d46773e5c938c4d82212
                                                      • Instruction ID: 422aa5295b4447ea79531820342fe2edc4fe08dfcfb9dc31cab82bc8f88a5095
                                                      • Opcode Fuzzy Hash: 8d32c33988476ada0362789829da53345387b3dd7626d46773e5c938c4d82212
                                                      • Instruction Fuzzy Hash: E9A15136E00219CFCF15DFA5C844A9EBBF2FF85300B1585AAE915AB221DB31ED55CB40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.272352426.0000000000BC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BC0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_bc0000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0cbcabed904ac4b57391b9be9e43474c7e445507084c85b244a9653e72ccf2bc
                                                      • Instruction ID: 6fcdfb114a9e230371160caed47211306dc9072f4429fac87de959ec7e8a7952
                                                      • Opcode Fuzzy Hash: 0cbcabed904ac4b57391b9be9e43474c7e445507084c85b244a9653e72ccf2bc
                                                      • Instruction Fuzzy Hash: CEC127B1812B668BD710CF64EC983AD3BA1BB85328F51430BD1692F6F0D7B4108AEF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:9.1%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:3.9%
                                                      Total number of Nodes:129
                                                      Total number of Limit Nodes:10
                                                      execution_graph 48437 63275f0 48438 6327615 48437->48438 48439 632778f 48438->48439 48440 6327d74 LdrInitializeThunk 48438->48440 48440->48438 48497 63fc818 48498 63fc87e 48497->48498 48502 63fc9d8 48498->48502 48505 63fc9c8 48498->48505 48499 63fc92d 48509 63fc3e4 48502->48509 48506 63fc9d8 48505->48506 48507 63fc3e4 DuplicateHandle 48506->48507 48508 63fca06 48507->48508 48508->48499 48510 63fca40 DuplicateHandle 48509->48510 48511 63fca06 48510->48511 48511->48499 48441 29aadd0 48442 29aadee 48441->48442 48445 29a9c5c 48442->48445 48444 29aae25 48446 29ac8f0 LoadLibraryA 48445->48446 48448 29ac9cc 48446->48448 48449 29a4540 48450 29a4554 48449->48450 48453 29a478a 48450->48453 48451 29a455d 48454 29a4793 48453->48454 48459 29a485f 48453->48459 48464 29a4986 48453->48464 48469 29a4870 48453->48469 48474 29a496c 48453->48474 48454->48451 48460 29a48b4 48459->48460 48461 29a49ab 48460->48461 48479 29a4c78 48460->48479 48484 29a4c67 48460->48484 48465 29a4999 48464->48465 48466 29a49ab 48464->48466 48467 29a4c78 2 API calls 48465->48467 48468 29a4c67 2 API calls 48465->48468 48467->48466 48468->48466 48470 29a48b4 48469->48470 48471 29a49ab 48470->48471 48472 29a4c78 2 API calls 48470->48472 48473 29a4c67 2 API calls 48470->48473 48472->48471 48473->48471 48475 29a491f 48474->48475 48476 29a49ab 48475->48476 48477 29a4c78 2 API calls 48475->48477 48478 29a4c67 2 API calls 48475->48478 48477->48476 48478->48476 48480 29a4c86 48479->48480 48489 29a4cb8 48480->48489 48493 29a4cc8 48480->48493 48481 29a4c96 48481->48461 48485 29a4c86 48484->48485 48487 29a4cb8 RtlEncodePointer 48485->48487 48488 29a4cc8 RtlEncodePointer 48485->48488 48486 29a4c96 48486->48461 48487->48486 48488->48486 48490 29a4d02 48489->48490 48491 29a4d2c RtlEncodePointer 48490->48491 48492 29a4d55 48490->48492 48491->48492 48492->48481 48494 29a4d02 48493->48494 48495 29a4d2c RtlEncodePointer 48494->48495 48496 29a4d55 48494->48496 48495->48496 48496->48481 48581 632cc08 48585 632cc27 48581->48585 48582 632ce91 48584 632c804 RegQueryValueExW 48584->48585 48585->48582 48585->48584 48586 6326174 48585->48586 48587 632cf20 RegOpenKeyExW 48586->48587 48589 632cfe6 48587->48589 48589->48589 48590 632dc88 48591 632dc99 48590->48591 48592 632dcc7 48591->48592 48593 632dd9b LdrInitializeThunk 48591->48593 48594 632ddb8 48593->48594 48512 63f6590 48514 63f65a5 48512->48514 48513 63f6884 48514->48513 48517 63f7cf8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 48514->48517 48518 63f6a38 48514->48518 48522 63f68a0 48514->48522 48517->48514 48528 63f6ef0 48518->48528 48535 63f6f00 48518->48535 48519 63f6a5f 48519->48514 48523 63f68c1 48522->48523 48524 63f68e4 48522->48524 48523->48514 48525 63f690e 48524->48525 48526 63f6ef0 3 API calls 48524->48526 48527 63f6f00 3 API calls 48524->48527 48525->48514 48526->48525 48527->48525 48529 63f6efd 48528->48529 48531 63f6f52 48529->48531 48532 63f6ef0 3 API calls 48529->48532 48533 63f6f00 3 API calls 48529->48533 48530 63f6f2a 48542 63f7cf8 48530->48542 48531->48519 48532->48530 48533->48530 48536 63f6f14 48535->48536 48538 63f6f52 48535->48538 48540 63f6ef0 3 API calls 48536->48540 48541 63f6f00 3 API calls 48536->48541 48537 63f6f2a 48539 63f7cf8 3 API calls 48537->48539 48538->48519 48539->48538 48540->48537 48541->48537 48543 63f7d03 48542->48543 48545 63f7d2b 48542->48545 48543->48531 48544 63f7d81 48544->48531 48545->48544 48546 63f7e1f 48545->48546 48549 63f7e2d 48545->48549 48547 63f6a38 3 API calls 48546->48547 48548 63f7e26 48547->48548 48548->48531 48549->48548 48552 63f81f8 48549->48552 48556 63f81e7 48549->48556 48561 63f8230 48552->48561 48569 63f8220 48552->48569 48553 63f8206 48553->48548 48557 63f81f8 48556->48557 48559 63f8230 2 API calls 48557->48559 48560 63f8220 2 API calls 48557->48560 48558 63f8206 48558->48548 48559->48558 48560->48558 48562 63f823d 48561->48562 48563 63f8265 48561->48563 48562->48553 48577 63f6c20 48563->48577 48565 63f8286 48565->48553 48567 63f834e GlobalMemoryStatusEx 48568 63f837e 48567->48568 48568->48553 48570 63f823d 48569->48570 48571 63f8265 48569->48571 48570->48553 48572 63f6c20 GlobalMemoryStatusEx 48571->48572 48574 63f8282 48572->48574 48573 63f8286 48573->48553 48574->48573 48575 63f834e GlobalMemoryStatusEx 48574->48575 48576 63f837e 48575->48576 48576->48553 48578 63f8308 GlobalMemoryStatusEx 48577->48578 48580 63f8282 48578->48580 48580->48565 48580->48567

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 63275f0-632767a 205 632767c call 29a2f10 0->205 206 632767c call 29a2db0 0->206 207 632767c call 29a2de0 0->207 9 6327681-63276f6 17 63276f8-6327739 9->17 18 632774d-6327757 9->18 17->18 23 632773b-632774b 17->23 21 632775d-632778d call 6325e2c call 63244f8 18->21 30 632778f-6327798 21->30 31 632779d-6327b4a 21->31 23->21 32 6328168-6328175 30->32 70 6327b50-6327b5d 31->70 71 6328135-6328158 31->71 72 6327b63-6327bce 70->72 73 632815d-6328167 70->73 71->73 72->71 84 6327bd4-6327c09 72->84 73->32 87 6327c32-6327c3a 84->87 88 6327c0b-6327c30 84->88 91 6327c3d-6327c86 call 6325e38 87->91 88->91 97 632811c-6328122 91->97 98 6327c8c-6327ce4 call 6325e44 91->98 97->71 99 6328124-632812d 97->99 98->97 106 6327cea-6327cf4 98->106 99->72 100 6328133 99->100 100->73 106->97 107 6327cfa-6327d0d 106->107 107->97 108 6327d13-6327d3a 107->108 112 6327d40-6327d43 108->112 113 63280dd-6328100 108->113 112->113 114 6327d49-6327d83 LdrInitializeThunk 112->114 121 6328105-632810b 113->121 124 6327d89-6327dd8 114->124 121->71 123 632810d-6328116 121->123 123->97 123->108 132 6327dde-6327e17 124->132 133 6327f1d-6327f23 124->133 137 6327f39-6327f3f 132->137 150 6327e1d-6327e53 132->150 134 6327f31 133->134 135 6327f25-6327f27 133->135 134->137 135->134 138 6327f41-6327f43 137->138 139 6327f4d-6327f50 137->139 138->139 141 6327f5b-6327f61 139->141 143 6327f63-6327f65 141->143 144 6327f6f-6327f72 141->144 143->144 146 6327ec1-6327ef1 call 6325e50 144->146 153 6327ef3-6327f12 146->153 156 6327f77-6327fa5 call 6325e5c 150->156 157 6327e59-6327e7c 150->157 161 6327faa-6327ffc 153->161 162 6327f18 153->162 156->153 157->156 167 6327e82-6327eb5 157->167 180 6328006-632800c 161->180 181 6327ffe-6328004 161->181 162->121 167->141 179 6327ebb 167->179 179->146 183 632801a 180->183 184 632800e-6328010 180->184 182 632801d-632803b 181->182 188 632805f-63280db 182->188 189 632803d-632804d 182->189 183->182 184->183 188->121 189->188 192 632804f-6328058 189->192 192->188 205->9 206->9 207->9
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: d9a5f85cc40e1ca2def37d3547887bf6e5e70104a1f8f53cb65c8d5d337ba82f
                                                      • Instruction ID: 78b57e6ab9b3e9f5324efe336b7b6d7cf5f426863a64154fd4fac31c22665707
                                                      • Opcode Fuzzy Hash: d9a5f85cc40e1ca2def37d3547887bf6e5e70104a1f8f53cb65c8d5d337ba82f
                                                      • Instruction Fuzzy Hash: E8623C31E007198FDB64EF78C95569DB7B2AF89300F1085A9D54AAB350EF34AE85CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 208 632dc88-632dc97 209 632dc99-632dc9c 208->209 210 632dcb8-632dcbb 209->210 211 632dc9e-632dcb1 209->211 214 632dcc2-632dcc5 210->214 215 632dcbd 210->215 212 632dcb3 211->212 213 632dce0-632dce7 211->213 212->210 218 632dd2b 213->218 219 632dce9-632dcf0 213->219 216 632dcc7-632dcd2 214->216 217 632dcd5-632dcd7 214->217 215->214 217->209 220 632dcd9-632dcde 217->220 223 632dd30-632ddb2 call 632c418 call 632c528 LdrInitializeThunk 218->223 221 632dcf2 219->221 222 632dd1d-632dd28 219->222 220->209 224 632dcf5-632dd01 221->224 238 632defb-632df18 223->238 239 632ddb8-632ddd2 223->239 224->218 225 632dd03-632dd06 224->225 225->223 227 632dd08-632dd16 225->227 227->218 228 632dd18-632dd1b 227->228 228->222 228->224 251 632df1d-632df26 238->251 239->238 242 632ddd8-632ddf2 239->242 246 632ddf4-632ddf6 242->246 247 632ddf8 242->247 248 632ddfb-632de56 call 632cbec 246->248 247->248 258 632de58-632de5a 248->258 259 632de5c 248->259 260 632de5f-632def9 call 632cbec 258->260 259->260 260->251
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: InitializeThunk
                                                      • String ID:
                                                      • API String ID: 2994545307-0
                                                      • Opcode ID: 3c64b82a58088aff6359e69ee6720a98fa66e43ca52cefc0ef812c1913ddec44
                                                      • Instruction ID: 3049daa9bb9c30f49935ed908a333f11187b5badd5d250ea114f43334aafd3e9
                                                      • Opcode Fuzzy Hash: 3c64b82a58088aff6359e69ee6720a98fa66e43ca52cefc0ef812c1913ddec44
                                                      • Instruction Fuzzy Hash: BB71E531F002169FCB54EBB4D884AEEB7A6EF85304F14893AD416DB285DF70D8058BE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 278 63f8230-63f823b 279 63f823d-63f8264 call 63f6c14 278->279 280 63f8265-63f8284 call 63f6c20 278->280 286 63f828a-63f82e9 280->286 287 63f8286-63f8289 280->287 294 63f82ef-63f837c GlobalMemoryStatusEx 286->294 295 63f82eb-63f82ee 286->295 298 63f837e-63f8384 294->298 299 63f8385-63f83ad 294->299 298->299
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508863788.00000000063F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_63f0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a9fd8c2783036f55ea44d1d63ebf49ef761aef15718600a0962f2141e23ef540
                                                      • Instruction ID: 94223befa0640ffaa786de16972ed74456362ce6f7925b80b0269ec6bb975ba8
                                                      • Opcode Fuzzy Hash: a9fd8c2783036f55ea44d1d63ebf49ef761aef15718600a0962f2141e23ef540
                                                      • Instruction Fuzzy Hash: 94410272D107458FCB04CFB9C8042EEBBF1EF89210F15896AD549E7651EB38A885CBD1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 302 632d179-632d197 303 632d199-632d1a3 302->303 304 632d1bc-632d241 302->304 305 632d1a5-632d1b6 303->305 306 632d1b8-632d1bb 303->306 310 632d243-632d246 304->310 311 632d249-632d253 304->311 305->306 310->311 312 632d255-632d25d 311->312 313 632d25f-632d2a1 RegQueryValueExW 311->313 312->313 314 632d2a3-632d2a9 313->314 315 632d2aa-632d2e4 313->315 314->315 319 632d2e6 315->319 320 632d2ee 315->320 319->320 321 632d2ef 320->321 321->321
                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 0632D291
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: 8261150c3c8c604cb258c994ea51d9faf85fd4e822131d211c7cb64aa94c9b9d
                                                      • Instruction ID: 92a54cbae3dd8f75a4c5426ee5179dffe14d25518a169eb71e4593e597c62ea1
                                                      • Opcode Fuzzy Hash: 8261150c3c8c604cb258c994ea51d9faf85fd4e822131d211c7cb64aa94c9b9d
                                                      • Instruction Fuzzy Hash: 184123B1E00359CFDB10CFA9C984A9EBBF5BF48310F15816AE819AB754D7749846CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 322 632cec3-632cedf 323 632cee1-632ceeb 322->323 324 632cf04-632cf70 322->324 325 632cf00-632cf03 323->325 326 632ceed-632cefe 323->326 328 632cf72-632cf75 324->328 329 632cf78 324->329 326->325 328->329 331 632cf82-632cfe4 RegOpenKeyExW 329->331 332 632cfe6-632cfec 331->332 333 632cfed-632d025 331->333 332->333 337 632d027-632d030 333->337 338 632d038 333->338 337->338 339 632d039 338->339 339->339
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 0632CFD4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: a297e91d318a464dfe11c66ea2f29989d3628a63a3b8a787dc7c61a79123ef99
                                                      • Instruction ID: e18b0147e2bd04229f778b2a13916c236a6829542f5f8f1a55430e5ed3f94e4d
                                                      • Opcode Fuzzy Hash: a297e91d318a464dfe11c66ea2f29989d3628a63a3b8a787dc7c61a79123ef99
                                                      • Instruction Fuzzy Hash: 084147B1E003899FDB50CF98C548B9EFBF5AF49314F28C16AE408AB751C7759849CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 340 29ac8e4-29ac947 341 29ac949-29ac953 340->341 342 29ac980-29ac9ca LoadLibraryA 340->342 341->342 343 29ac955-29ac957 341->343 349 29ac9cc-29ac9d2 342->349 350 29ac9d3-29aca04 342->350 344 29ac97a-29ac97d 343->344 345 29ac959-29ac963 343->345 344->342 347 29ac967-29ac976 345->347 348 29ac965 345->348 347->347 351 29ac978 347->351 348->347 349->350 354 29aca06-29aca0a 350->354 355 29aca14 350->355 351->344 354->355 356 29aca0c 354->356 357 29aca15 355->357 356->355 357->357
                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(?), ref: 029AC9BA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500992614.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_29a0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: f292bd4fae98f7e68f473176cd8e770c6cc2f42ffded7d6209d40b0aed36e716
                                                      • Instruction ID: c0ff86095246cca82f54af2759d0b962b157c3063ba8ab7f6ea079603936870a
                                                      • Opcode Fuzzy Hash: f292bd4fae98f7e68f473176cd8e770c6cc2f42ffded7d6209d40b0aed36e716
                                                      • Instruction Fuzzy Hash: 993114B1D003499FDB14CFA8C8957AEBBB1BB48314F14852AE856AB380D7789486CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 358 29a9c5c-29ac947 360 29ac949-29ac953 358->360 361 29ac980-29ac9ca LoadLibraryA 358->361 360->361 362 29ac955-29ac957 360->362 368 29ac9cc-29ac9d2 361->368 369 29ac9d3-29aca04 361->369 363 29ac97a-29ac97d 362->363 364 29ac959-29ac963 362->364 363->361 366 29ac967-29ac976 364->366 367 29ac965 364->367 366->366 370 29ac978 366->370 367->366 368->369 373 29aca06-29aca0a 369->373 374 29aca14 369->374 370->363 373->374 375 29aca0c 373->375 376 29aca15 374->376 375->374 376->376
                                                      APIs
                                                      • LoadLibraryA.KERNELBASE(?), ref: 029AC9BA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500992614.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_29a0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 9f25b2b5e55ea7ad41631a4dfe3484b87a440547512ee18e303e6257d5a544d3
                                                      • Instruction ID: d6bff3ed8b0891df82dcae5d29e20999ba20d22331027add89dcaac881c5ce7b
                                                      • Opcode Fuzzy Hash: 9f25b2b5e55ea7ad41631a4dfe3484b87a440547512ee18e303e6257d5a544d3
                                                      • Instruction Fuzzy Hash: AC3105B0D00349DFDB14CFA9C8957AEBBB5BB48314F14852AE816BB380D7749885CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 377 632c804-632d241 380 632d243-632d246 377->380 381 632d249-632d253 377->381 380->381 382 632d255-632d25d 381->382 383 632d25f-632d2a1 RegQueryValueExW 381->383 382->383 384 632d2a3-632d2a9 383->384 385 632d2aa-632d2e4 383->385 384->385 389 632d2e6 385->389 390 632d2ee 385->390 389->390 391 632d2ef 390->391 391->391
                                                      APIs
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 0632D291
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: QueryValue
                                                      • String ID:
                                                      • API String ID: 3660427363-0
                                                      • Opcode ID: ad48719b7888186dca55a35f646b84820e84d5be622b9faf43f84e2728c09f78
                                                      • Instruction ID: 9e87f0baa6012663403ad133b2ff33eab44b0497b1852350d7dbea84e00dfe0e
                                                      • Opcode Fuzzy Hash: ad48719b7888186dca55a35f646b84820e84d5be622b9faf43f84e2728c09f78
                                                      • Instruction Fuzzy Hash: 1531CFB1D00269DFCB50CF9AC984ADEBBF5BF48314F14802AE819AB314D774A945CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1011 6326174-632cf70 1013 632cf72-632cf75 1011->1013 1014 632cf78-632cfe4 RegOpenKeyExW 1011->1014 1013->1014 1016 632cfe6-632cfec 1014->1016 1017 632cfed-632d025 1014->1017 1016->1017 1021 632d027-632d030 1017->1021 1022 632d038 1017->1022 1021->1022 1023 632d039 1022->1023 1023->1023
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 0632CFD4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508794719.0000000006320000.00000040.00000800.00020000.00000000.sdmp, Offset: 06320000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6320000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID:
                                                      • API String ID: 71445658-0
                                                      • Opcode ID: 888297f2f93fcad8404a9ebcdcb3867bfaecfac448e30ca1bfe30c039d3c76db
                                                      • Instruction ID: 9ce77b473d96c4c119f0baa092520ed340bad04847397947293bdbd88c83741e
                                                      • Opcode Fuzzy Hash: 888297f2f93fcad8404a9ebcdcb3867bfaecfac448e30ca1bfe30c039d3c76db
                                                      • Instruction Fuzzy Hash: 303101B1D012899FDB50CF99C584ACEFBF5BF48314F28816AE408AB310C7759889CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1024 63fc3e4-63fcad4 DuplicateHandle 1026 63fcadd-63fcafa 1024->1026 1027 63fcad6-63fcadc 1024->1027 1027->1026
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,063FCA06,?,?,?,?,?), ref: 063FCAC7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508863788.00000000063F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_63f0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: 2d93c892473fe15ea4c51308b349bc0affc84d22ccb38a16c6a7a5a13a52edac
                                                      • Instruction ID: 00abb66f4e535014971b4ab469d6ccb79c96d757bcb3d575abd8c1b8e4ea4764
                                                      • Opcode Fuzzy Hash: 2d93c892473fe15ea4c51308b349bc0affc84d22ccb38a16c6a7a5a13a52edac
                                                      • Instruction Fuzzy Hash: 5B21E5B5D00248DFDF50CF9AD884AEEBBF4EB48324F14841AE914A3710D374A954CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1030 63fca3a 1031 63fca40-63fcad4 DuplicateHandle 1030->1031 1032 63fcadd-63fcafa 1031->1032 1033 63fcad6-63fcadc 1031->1033 1033->1032
                                                      APIs
                                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,063FCA06,?,?,?,?,?), ref: 063FCAC7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508863788.00000000063F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_63f0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: DuplicateHandle
                                                      • String ID:
                                                      • API String ID: 3793708945-0
                                                      • Opcode ID: fadaf3b8d97186952720d0b90bb04dc46d668a80779edf52c48137cbcbf9f6fa
                                                      • Instruction ID: 57167cf893065f9bf1bdf6ba3ea942526f14e962eddd9b3f0160df4f1f668f93
                                                      • Opcode Fuzzy Hash: fadaf3b8d97186952720d0b90bb04dc46d668a80779edf52c48137cbcbf9f6fa
                                                      • Instruction Fuzzy Hash: 1C21E3B5D00248AFDB10CFAAD884ADEBBF4EB48324F14841AE914A3710D378A945CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1036 29a4cb8-29a4d0a 1039 29a4d0c-29a4d0e 1036->1039 1040 29a4d10 1036->1040 1041 29a4d15-29a4d20 1039->1041 1040->1041 1042 29a4d22-29a4d53 RtlEncodePointer 1041->1042 1043 29a4d81-29a4d8e 1041->1043 1045 29a4d5c-29a4d7c 1042->1045 1046 29a4d55-29a4d5b 1042->1046 1045->1043 1046->1045
                                                      APIs
                                                      • RtlEncodePointer.NTDLL(00000000), ref: 029A4D42
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500992614.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_29a0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID:
                                                      • API String ID: 2118026453-0
                                                      • Opcode ID: 8f52f1faf7ec7739692124437d3709dc4ae0b9e6a15bbffe9e86948a3457a6a6
                                                      • Instruction ID: 83664c124922d0c29d713cb00f27967ff2e2664f3ccf283f084d38526fd96e22
                                                      • Opcode Fuzzy Hash: 8f52f1faf7ec7739692124437d3709dc4ae0b9e6a15bbffe9e86948a3457a6a6
                                                      • Instruction Fuzzy Hash: 7E21C7B18013858FCB10DFA9CA5839EBFF4EB09328F14846AD449E7A40CB786845CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1147 63f8300-63f8346 1148 63f834e-63f837c GlobalMemoryStatusEx 1147->1148 1149 63f837e-63f8384 1148->1149 1150 63f8385-63f83ad 1148->1150 1149->1150
                                                      APIs
                                                      • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,063F8282), ref: 063F836F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508863788.00000000063F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_63f0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemoryStatus
                                                      • String ID:
                                                      • API String ID: 1890195054-0
                                                      • Opcode ID: 18cb57295495867e4529ee0417fd0f9439f54fb4339c64e3cdee1f209ffcff01
                                                      • Instruction ID: 5f9dc37a24936572ba5c95ff7934e0b325ac2ae72579c34eac6c4eef52d58b22
                                                      • Opcode Fuzzy Hash: 18cb57295495867e4529ee0417fd0f9439f54fb4339c64e3cdee1f209ffcff01
                                                      • Instruction Fuzzy Hash: 3A1133B6C006598FCB00CFA9C9457EEFBB4AF48324F15852AD418B7640D338A945CFE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1140 63f6c20-63f837c GlobalMemoryStatusEx 1143 63f837e-63f8384 1140->1143 1144 63f8385-63f83ad 1140->1144 1143->1144
                                                      APIs
                                                      • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,063F8282), ref: 063F836F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.508863788.00000000063F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063F0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_63f0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemoryStatus
                                                      • String ID:
                                                      • API String ID: 1890195054-0
                                                      • Opcode ID: 6498494de44f32d6e19a090aa2a376c14a9534564d7dcb8af9adbf7c7460e754
                                                      • Instruction ID: 0c2a37a49108fd9d47f8f4176e1e39736ef8e03553f8e420e2f026626f5542b2
                                                      • Opcode Fuzzy Hash: 6498494de44f32d6e19a090aa2a376c14a9534564d7dcb8af9adbf7c7460e754
                                                      • Instruction Fuzzy Hash: D11103B6C006599BCB10CF9AC8447EEFBB4AB48324F14812AD918B7650D778A945CFE5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlEncodePointer.NTDLL(00000000), ref: 029A4D42
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500992614.00000000029A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029A0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_29a0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID:
                                                      • API String ID: 2118026453-0
                                                      • Opcode ID: 2c592bca6813a47d383255c7bb89ffe4855d5c424a2a5ed80a1d965d45722447
                                                      • Instruction ID: ac34c776170c3146891099185819167c08c840d3a627b4e08739f447fc93cf6f
                                                      • Opcode Fuzzy Hash: 2c592bca6813a47d383255c7bb89ffe4855d5c424a2a5ed80a1d965d45722447
                                                      • Instruction Fuzzy Hash: E711A9B09003498FDB50DFA9CA5979EBBF8EB44328F108429D808B3A00DB786845CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500510127.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_27bd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 13dac8a3e0da7b91ecc5a4f6a7169088b68aa7a2945e78ab86a2e62754402bd1
                                                      • Instruction ID: d7d349566a12da763e0517f1482679d14c0ae3b52d719c475ec442559fc1c6e2
                                                      • Opcode Fuzzy Hash: 13dac8a3e0da7b91ecc5a4f6a7169088b68aa7a2945e78ab86a2e62754402bd1
                                                      • Instruction Fuzzy Hash: F542D3B284D3C19FD7434BB489613817FB1AF97224F5B44EBC4C0CA1A3E26D495ADB22
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500510127.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_27bd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ded596a8a75247b5c773e6dfbbc5d20425147654408e568bf3cdb8d0a5cde336
                                                      • Instruction ID: 4ef069085780dbdecfe45be1e368efe217c1a4c129b79b6a60fde3ef9217dd66
                                                      • Opcode Fuzzy Hash: ded596a8a75247b5c773e6dfbbc5d20425147654408e568bf3cdb8d0a5cde336
                                                      • Instruction Fuzzy Hash: E432D3B284D3C19FD7434BB489613817FB1AF97224F5B44EBC4C0CA1A3E26D495ADB22
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500510127.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_27bd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 28d6132c8a68290efba284f84c8e6272352d3377d122bdd056c0ac1bc3b63e69
                                                      • Instruction ID: d08cd11f393e6b388bd327e27e7258a0a1f696af121e0295489fb7aa11ca8b44
                                                      • Opcode Fuzzy Hash: 28d6132c8a68290efba284f84c8e6272352d3377d122bdd056c0ac1bc3b63e69
                                                      • Instruction Fuzzy Hash: 0702E5B284D3C19FD7434BB4C9617817FB1AF97224F1A44EBC4C1CA1A3E26D495ADB22
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 110a1c61a18eada2ed0b6fa713ef56b7377832de65b9c934078a1669e60e2233
                                                      • Instruction ID: c9915f34459a8c7087ba72d6f773f9e651f84872756637cb9ebb320897f9c569
                                                      • Opcode Fuzzy Hash: 110a1c61a18eada2ed0b6fa713ef56b7377832de65b9c934078a1669e60e2233
                                                      • Instruction Fuzzy Hash: 5722D235F00244AFEB14EB74C8546EEB7B3AF85314F14856AD40A9B395EB74DC4ACBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 43ebae810f57d1f3fc34de262c616e353d524816a9f3656391c30f849c416cb8
                                                      • Instruction ID: 06531935e0a526c4fb06c6938ef3c25f67bb420fb5486563d424caf625edc322
                                                      • Opcode Fuzzy Hash: 43ebae810f57d1f3fc34de262c616e353d524816a9f3656391c30f849c416cb8
                                                      • Instruction Fuzzy Hash: B7223E34A0411C8FEB24EBA0C850BEEBB72EF85304F5080A9D10A6B765DF355E59EF65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 068b12eb9a0b931151dcdb321612431cb61e525a2671a0b64f82ccb586edcaf0
                                                      • Instruction ID: 6e5744042013c58d927bb284912667da5926d3609102b446db00eb99ac882370
                                                      • Opcode Fuzzy Hash: 068b12eb9a0b931151dcdb321612431cb61e525a2671a0b64f82ccb586edcaf0
                                                      • Instruction Fuzzy Hash: 1FC1F975A001199FDB14CF68C9849EDBBF6BF89310F16809AE419AB361CB71EC85CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d236a941968416dd8a13d42ee8f76373951f6481783b304a1a7b34b30e3769f8
                                                      • Instruction ID: 324619cfc99238bcea1c1530dd1e9a268b734819955bce5860f1f3dd04b773e7
                                                      • Opcode Fuzzy Hash: d236a941968416dd8a13d42ee8f76373951f6481783b304a1a7b34b30e3769f8
                                                      • Instruction Fuzzy Hash: 2271E2717042048FEB299B64D894AEEBBBBBBC9750B1444AAE006CB391DF74DC528761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5efa34cf877a06cab7c43083f5fbfb033c70aa167c460f839cc13dd09690bf3e
                                                      • Instruction ID: ae656ff6327ee0899bff57ffba7d777ae2b2425cefe44a92c180d9b5e55989b9
                                                      • Opcode Fuzzy Hash: 5efa34cf877a06cab7c43083f5fbfb033c70aa167c460f839cc13dd09690bf3e
                                                      • Instruction Fuzzy Hash: BB41E4313041049FDB159F28DC54AFE7BA2EF89311B05446AF90ACB3A1CA74DD1BDB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 88b11b05ac40c1baabcf5e8624750daacc58cb462bb5e68565cf8db4d1e0df08
                                                      • Instruction ID: 5664fdc39a7d3d2ecd7a427bedefd8d89b0f39f0ef0ba765be9d31e37b826f21
                                                      • Opcode Fuzzy Hash: 88b11b05ac40c1baabcf5e8624750daacc58cb462bb5e68565cf8db4d1e0df08
                                                      • Instruction Fuzzy Hash: D431E571A04215AFDB00CFA9DC849EFBBB5FF89310B0044ABE509D7352D670DA46CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 46692e60ea76f42f584c0539bf9ec29e45ae0fb2d723b53d609f8f5793e82acf
                                                      • Instruction ID: 58163fa72bf21482ee56314b172d51d398c7cc4ea58741f1991736fe8052ac86
                                                      • Opcode Fuzzy Hash: 46692e60ea76f42f584c0539bf9ec29e45ae0fb2d723b53d609f8f5793e82acf
                                                      • Instruction Fuzzy Hash: D32141367045119FD714DA6CD894AAAB7E6FFC871071940BAE80ACB375DEB1DC068BA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2bdee9351394c0b2087c279424c84f2d54c3054a2434c33e9828e1011e678a39
                                                      • Instruction ID: ea83eda7b983569c53b7ffd65a31dde96bfab70b63f25494f729f6b4a1156e71
                                                      • Opcode Fuzzy Hash: 2bdee9351394c0b2087c279424c84f2d54c3054a2434c33e9828e1011e678a39
                                                      • Instruction Fuzzy Hash: 982160367045109FD714DE6CD894AAAB3E6FF8871071940AAE80ACB371DEB1DC068B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500353124.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_dbd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f2d5c6f91d2c9e90cda67590136bc8af173062f49d41e728f4a3f2e1f06d3af2
                                                      • Instruction ID: d38094f3badaa1f6a42cf1b5a107d92d0908e0bd150c43b5a9869f7216088027
                                                      • Opcode Fuzzy Hash: f2d5c6f91d2c9e90cda67590136bc8af173062f49d41e728f4a3f2e1f06d3af2
                                                      • Instruction Fuzzy Hash: 27213A71504240DFDB15CF10D9C0B9ABFA6FB89328F24856DE8060B356D336D849CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500353124.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_dbd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 92c2d16928674a17eea20694a8f3d7ffc5a91e9c045f0108d90a6838faf03b2d
                                                      • Instruction ID: 4d598b59bd38e86833cbf93477bc1942ea5a41c2939908a67bac4e84977bd3a0
                                                      • Opcode Fuzzy Hash: 92c2d16928674a17eea20694a8f3d7ffc5a91e9c045f0108d90a6838faf03b2d
                                                      • Instruction Fuzzy Hash: C42128B1500244EFDB05DF10D9C0BA6BF66FB94324F24C569E84A0B606D33AE84AC7B1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500510127.00000000027BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 027BD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_27bd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b83e02f6d2edd95d16e4680e1e9b50fdf026edb4b42f89830daeed18773cda84
                                                      • Instruction ID: b8d49322e768dd3faaa8cdf185d84e08eeee6adb3f3ca71eb8a13deecb16b67a
                                                      • Opcode Fuzzy Hash: b83e02f6d2edd95d16e4680e1e9b50fdf026edb4b42f89830daeed18773cda84
                                                      • Instruction Fuzzy Hash: C4212575604240EFDB02CF20D9C0BA6BB61FF88318F64C96DE8495B346C33AD846CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500353124.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_dbd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction ID: f22b85f008538a8dee6d1182eae56102b38057b40331cb36b7a9a4d693dc0197
                                                      • Opcode Fuzzy Hash: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction Fuzzy Hash: C611E976404280DFCF11CF10D5C4B56BFB2FB95324F28C6A9D8454B656C33AD856CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.500353124.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_dbd000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction ID: fbd0f9772b8c234ae98f5271a073282819ba16dfe841d87cc3530a6ea0e7ed53
                                                      • Opcode Fuzzy Hash: 5cc266a14d3ef7d67b01d83a3dd366f49f170e6375fe939ec088120573f0f532
                                                      • Instruction Fuzzy Hash: A711E676404280DFCF06CF10D5C4B56BF72FB94324F28C6A9D8494B616C33AE85ACBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.507939516.00000000054B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054B0000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_54b0000_RegSvcs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 62b2c7dc3b5fd8a4a24048f605540aad20b08810f002aa03774a815d0441599b
                                                      • Instruction ID: 55e64acb7feedeaddbd04c3cd21107c6ed7cd4cb8808e26e0f432a348050e9f3
                                                      • Opcode Fuzzy Hash: 62b2c7dc3b5fd8a4a24048f605540aad20b08810f002aa03774a815d0441599b
                                                      • Instruction Fuzzy Hash: EDD0677AB10008AFCB049F98E8408DDFB76FB98226B048116FA25A3660CB31A925DB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%