Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetectNet.01.16858.8637

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetectNet.01.16858.8637 (renamed file extension from 8637 to exe)
Analysis ID:682147
MD5:dfe8f6d0b1fb5fb795f5596564ed5a60
SHA1:0e94379e76c28d605fd35c65369626a823924000
SHA256:342c1de5e06e65ef00a4d5c0c39e4157d5b54268f3324d6db17f76498b02a7c1
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • bgnFA.exe (PID: 2508 cmdline: "C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe" MD5: DFE8F6D0B1FB5FB795F5596564ED5A60)
    • bgnFA.exe (PID: 5936 cmdline: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe MD5: DFE8F6D0B1FB5FB795F5596564ED5A60)
  • bgnFA.exe (PID: 5312 cmdline: "C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe" MD5: DFE8F6D0B1FB5FB795F5596564ED5A60)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "mostafa@gpd-qatar.com", "Password": "Toy?C@R2v$4bKt", "Host": "mail.gpd-qatar.com"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x678c1:$a13: get_DnsResolver
        • 0x9b6e1:$a13: get_DnsResolver
        • 0xcf301:$a13: get_DnsResolver
        • 0x6611e:$a20: get_LastAccessed
        • 0x99f3e:$a20: get_LastAccessed
        • 0xcdb5e:$a20: get_LastAccessed
        • 0x68251:$a27: set_InternalServerPort
        • 0x9c071:$a27: set_InternalServerPort
        • 0xcfc91:$a27: set_InternalServerPort
        • 0x6856e:$a30: set_GuidMasterKey
        • 0x9c38e:$a30: set_GuidMasterKey
        • 0xcffae:$a30: set_GuidMasterKey
        • 0x66225:$a33: get_Clipboard
        • 0x9a045:$a33: get_Clipboard
        • 0xcdc65:$a33: get_Clipboard
        • 0x66233:$a34: get_Keyboard
        • 0x9a053:$a34: get_Keyboard
        • 0xcdc73:$a34: get_Keyboard
        • 0x674de:$a35: get_ShiftKeyDown
        • 0x9b2fe:$a35: get_ShiftKeyDown
        • 0xcef1e:$a35: get_ShiftKeyDown
        00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x3059a:$s10: logins
              • 0x2fff6:$s11: credential
              • 0x2c61d:$g1: get_Clipboard
              • 0x2c62b:$g2: get_Keyboard
              • 0x2c638:$g3: get_Password
              • 0x2d8c6:$g4: get_CtrlKeyDown
              • 0x2d8d6:$g5: get_ShiftKeyDown
              • 0x2d8e7:$g6: get_AltKeyDown
              0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2dcb9:$a13: get_DnsResolver
              • 0x2c516:$a20: get_LastAccessed
              • 0x2e649:$a27: set_InternalServerPort
              • 0x2e966:$a30: set_GuidMasterKey
              • 0x2c61d:$a33: get_Clipboard
              • 0x2c62b:$a34: get_Keyboard
              • 0x2d8d6:$a35: get_ShiftKeyDown
              • 0x2d8e7:$a36: get_AltKeyDown
              • 0x2c638:$a37: get_Password
              • 0x2d0ac:$a38: get_PasswordHash
              • 0x2e0c1:$a39: get_DefaultCredentials
              6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 22 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeVirustotal: Detection: 17%Perma Link
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeVirustotal: Detection: 17%Perma Link
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "mostafa@gpd-qatar.com", "Password": "Toy?C@R2v$4bKt", "Host": "mail.gpd-qatar.com"}
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: global trafficTCP traffic: 192.168.2.5:49767 -> 50.87.253.110:587
                Source: global trafficTCP traffic: 192.168.2.5:49767 -> 50.87.253.110:587
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DGTGmt.com
                Source: bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.698098173.0000000003121000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.698171434.000000000312A000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697762371.00000000030F7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://LyFPshcnr7V.net
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/cps.html0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ac.economia.gob.mx/last.crl0G
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acedicom.edicomgroup.com/doc0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://acraiz.icpbrasil.gov.br/LCRacraizv2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/DPCyPoliticas0g
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/crl/MTINAutoridadRaiz03
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca.mtin.es/mtin/ocsp0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.starfieldtech.com/repository/1604
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oati.net/repository/OATICA2.crt0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crl
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.oaticerts.com/repository/OATICA2.crt08
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cps.siths.se/sithsrootcav1.html0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.certigna.fr/certignarootca.crl01
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.defence.gov.au/pki0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.dhimyotis.com/certignarootca.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.628638098.0000000000AD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.oces.trust2408.com/oces.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706267699.0000000005FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.628638098.0000000000AD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.securetrust.com/STCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-a/cacrl.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-b/cacrl.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.708046683.00000000067CF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627443158.00000000067CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.ssc.lt/root-c/cacrl.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/QF:
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495839319.00000000067F5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627609088.00000000067F8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/CABD2A79A1076A31F21D253635CB0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/CRL2/CA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/cacert/ComSignAdvancedSecurityCA.crt0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignAdvancedSecurityCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627807287.0000000005F75000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fedir.comsign.co.il/crl/comsignglobalrootca.crl0;
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://http.fpki.gov/fcpca/caCertsIssuedByfcpca.p7c0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.gpd-qatar.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.accv.es0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.eca.hinet.net/OCSP/ocspG2sha20
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.ncdc.gov.sa0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.gva.es0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.suscerte.gob.ve0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, bgnFA.exe.6.drString found in binary or memory: http://philiphanson.org/medius/book/1.0
                Source: bgnFA.exe.6.drString found in binary or memory: http://philiphanson.org/medius/temp-transform
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499067814.0000000005F79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.digidentity.eu/validatie0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pki.registradores.org/normativa/index.htm0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://policy.camerfirma.com0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://postsignum.ttc.cz/crl/psrootqca2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497437781.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706213888.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497043630.0000000005F97000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499099053.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://repository.swisssign.com/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497437781.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706213888.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499099053.0000000005F96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://web.ncdc.gov.sa/crl/nrcaparta1.crl
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org/doc0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.acabogacia.org0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es/legislacion_c.htm0U
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.accv.es00
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/acrn.crl0)
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.agesic.gub.uy/acrn/cps_acrn.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.ancert.com/cps0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/AC/RC/ocsp0c
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.anf.es/es/address-direccion.html
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ca.posta.rs/dokumentacija0h
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417003338.0000000005BDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417003338.0000000005BDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.com91(Z
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417045383.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417084076.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417003338.0000000005BDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comc1nZ1
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.como
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.417003338.0000000005BDD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comwit
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cert.fnmt.es/dpcs/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/pc-root2.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certeurope.fr/reference/root2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.certicamara.com/dpc/0Z
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class1.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3P.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499067814.0000000005F79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.certplus.com/CRL/class3TS.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.chambersign.org1
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.comsign.co.il/cps0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.correo.com.uy/correocert/cps.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627417778.00000000067C3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-bt0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497454262.0000000005F9B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-int0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496857402.00000000067D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.datev.de/zertifikat-policy-std0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.defence.gov.au/pki0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.disig.sk/ca0f
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627511724.0000000000AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.dnie.es/dpc0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-me.lv/repository0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497585491.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706267699.0000000005FAC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.e-trust.be/CPS/QNcerts
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ecee.gov.pt/dpc0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.echoworx.com/ca/root2/cps.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.eme.lv/repository0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.firmaprofesional.com/cps0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.448367203.00000000012D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comgrito
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.413853855.0000000005BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.413853855.0000000005BD8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn-
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.globaltrust.info0=
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.informatik.admin.ch/PKI/links/CPS_2_16_756_1_17_3_1_0.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.oaticerts.com/repository.
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499163953.0000000000AF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.676529704.0000000000AF6000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627511724.0000000000AF6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_21_1.pdf0:
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pki.gva.es/cps0%
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.postsignum.cz/crl/psrootqca2.crl02
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.quovadisglobal.com/cps0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.rcsc.lt/repository0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.411626950.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.411626950.0000000005BEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comivu
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.411626950.0000000005BEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comt
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/cps/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sk.ee/juur/crl/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.708046683.00000000067CF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627443158.00000000067CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.ssc.lt/cps03
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/dpc0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.suscerte.gob.ve/lcr0#
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.414005981.0000000005BD8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.414013214.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/acrn/acrn.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www2.postsignum.cz/crl/psrootqca2.crl01
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%$
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%GETOK
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crl.anf.es/AC/ANFServerCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eca.hinet.net/repository0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://repository.luxtrust.lu0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://web.certicamara.com/marco-legal0Z
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ACTAS/789230
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/AC/ANFServerCA.crl0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anf.es/address/)1(0&
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.catcert.net/verarrel05
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.hu/docs/
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.netlock.net/docs
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wwww.certigna.fr/autorites/0m
                Source: unknownDNS traffic detected: queries for: mail.gpd-qatar.com

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeJump to behavior
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.447804176.0000000000F2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5800, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD323C4A9u002d3203u002d48AFu002dBCE9u002d20800F01B95Bu007d/u00346788441u002dC7C0u002d44BFu002dB790u002dF91B01BA75FB.csLarge array initialization: .cctor: array initializer size 11464
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5884, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5800, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 0_2_012CC2140_2_012CC214
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 0_2_012CEBA80_2_012CEBA8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 0_2_012CEBB80_2_012CEBB8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 0_2_051886400_2_05188640
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 0_2_051886100_2_05188610
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0281EFD86_2_0281EFD8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0281F3206_2_0281F320
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0281FBF06_2_0281FBF0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_028160A36_2_028160A3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DDA186_2_061DDA18
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DC0086_2_061DC008
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DD0806_2_061DD080
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DF9D06_2_061DF9D0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DCF306_2_061DCF30
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D32A86_2_061D32A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D41E16_2_061D41E1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C87646_2_063C8764
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C50606_2_063C5060
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C00406_2_063C0040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C10806_2_063C1080
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C21086_2_063C2108
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063CAC206_2_063CAC20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C3C006_2_063C3C00
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C9A686_2_063C9A68
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063C8C106_2_063C8C10
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063CAC106_2_063CAC10
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_063CB9106_2_063CB910
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_06436E806_2_06436E80
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0643047A6_2_0643047A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_064330786_2_06433078
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_064358786_2_06435878
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0643D9786_2_0643D978
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0643A1D86_2_0643A1D8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_064373286_2_06437328
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_0643A1746_2_0643A174
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_064395F06_2_064395F0
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCodeKPEkBAWDzqvcYgqMPAoc.exe4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.449157978.0000000002CA7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCodeKPEkBAWDzqvcYgqMPAoc.exe4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.456163943.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.456312270.0000000008BE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.449669672.0000000002D42000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.447804176.0000000000F2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.429740069.00000000075D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.455944920.00000000076D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000000.407309402.0000000000927000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameEnumAssembliesFl.exe. vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.486008108.0000000005EE3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEnumAssembliesFl.exe. vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000000.445608917.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCodeKPEkBAWDzqvcYgqMPAoc.exe4 vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.672371331.0000000000799000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeBinary or memory string: OriginalFilenameEnumAssembliesFl.exe. vs SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeVirustotal: Detection: 17%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeJump to behavior
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe "C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe "C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe"
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/4@2/2
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.810000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: bgnFA.exe.6.dr, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic file information: File size 1131008 > 1048576
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.810000.0.unpack, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: bgnFA.exe.6.dr, Main.cs.Net Code: SafeHandle System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D166A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1662 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D169A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16BA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16B2 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16AA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D26D8 pushfd ; iretd 6_2_061D26D9
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16DA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16D2 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16CA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16C2 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16FA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16F2 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16EA push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D16E2 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D171A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1712 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D170A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1702 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D173A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1732 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D172A push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1722 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1742 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D179E push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D1796 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D178E push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D17BE push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D17B6 push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D17AE push es; ret 6_2_061D18C4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061D17A6 push es; ret 6_2_061D18C4
                Source: initial sampleStatic PE information: section name: .text entropy: 7.433620851852969
                Source: initial sampleStatic PE information: section name: .text entropy: 7.433620851852969
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeJump to dropped file
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run bgnFAJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run bgnFAJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile opened: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.539353757.000000000327C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.450695772.0000000002F57000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: bgnFA.exe PID: 2508, type: MEMORYSTR
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.450695772.0000000002F57000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000A.00000002.539353757.000000000327C000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.450695772.0000000002F57000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000A.00000002.539353757.000000000327C000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe TID: 5892Thread sleep time: -45877s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe TID: 3952Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe TID: 6076Thread sleep count: 9539 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe TID: 4520Thread sleep time: -45877s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe TID: 4596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe TID: 5296Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe TID: 4112Thread sleep count: 9408 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWindow / User API: threadDelayed 9539Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWindow / User API: threadDelayed 9408Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeThread delayed: delay time: 45877Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeThread delayed: delay time: 45877Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.628197268.0000000006888000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496499510.0000000006885000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWF_
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.628197268.0000000006888000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496499510.0000000006885000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.447149466.0000000008B60000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: nRQemu
                Source: bgnFA.exe, 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeCode function: 6_2_061DC4A0 LdrInitializeThunk,6_2_061DC4A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeMemory written: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeProcess created: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: bgnFA.exe PID: 5936, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: bgnFA.exe PID: 5936, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3dd0c28.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d9ce08.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.3d659e8.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5884, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe PID: 5800, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: bgnFA.exe PID: 5936, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                111
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                114
                System Information Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                1
                Query Registry
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                1
                Credentials in Registry
                311
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model111
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets131
                Virtualization/Sandbox Evasion
                SSH1
                Clipboard Data
                Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                Process Injection
                DCSync1
                Remote System Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Hidden Files and Directories
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 682147 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 11/08/2022 Architecture: WINDOWS Score: 100 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Yara detected AgentTesla 2->47 49 4 other signatures 2->49 6 SecuriteInfo.com.W32.AIDetectNet.01.16858.exe 3 2->6         started        10 bgnFA.exe 3 2->10         started        12 bgnFA.exe 2 2->12         started        process3 file4 21 SecuriteInfo.com.W...et.01.16858.exe.log, ASCII 6->21 dropped 51 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->53 55 Injects a PE file into a foreign processes 6->55 14 SecuriteInfo.com.W32.AIDetectNet.01.16858.exe 2 5 6->14         started        57 Multi AV Scanner detection for dropped file 10->57 19 bgnFA.exe 2 10->19         started        signatures5 process6 dnsIp7 27 mail.gpd-qatar.com 50.87.253.110, 49767, 49856, 587 UNIFIEDLAYER-AS-1US United States 14->27 29 192.168.2.1 unknown unknown 14->29 23 C:\Users\user\AppData\Roaming\...\bgnFA.exe, PE32 14->23 dropped 25 C:\Users\user\...\bgnFA.exe:Zone.Identifier, ASCII 14->25 dropped 31 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->31 33 Tries to steal Mail credentials (via file / registry access) 14->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->35 37 Tries to harvest and steal ftp login credentials 19->37 39 Tries to harvest and steal browser information (history, passwords, etc) 19->39 41 Installs a global keyboard hook 19->41 file8 signatures9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.W32.AIDetectNet.01.16858.exe17%VirustotalBrowse
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe17%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                6.0.SecuriteInfo.com.W32.AIDetectNet.01.16858.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ipify.org%GETOK0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3.crl00%URL Reputationsafe
                http://www.e-me.lv/repository00%URL Reputationsafe
                http://www.acabogacia.org/doc00%URL Reputationsafe
                http://crl.chambersign.org/chambersroot.crl00%URL Reputationsafe
                http://ocsp.suscerte.gob.ve00%URL Reputationsafe
                http://www.postsignum.cz/crl/psrootqca2.crl020%URL Reputationsafe
                http://crl.dhimyotis.com/certignarootca.crl00%URL Reputationsafe
                http://www.chambersign.org10%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy00%URL Reputationsafe
                http://www.suscerte.gob.ve/lcr0#0%URL Reputationsafe
                http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz00%URL Reputationsafe
                http://crl.ssc.lt/root-c/cacrl.crl00%URL Reputationsafe
                http://postsignum.ttc.cz/crl/psrootqca2.crl00%URL Reputationsafe
                http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%URL Reputationsafe
                http://ca.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://crl1.comsign.co.il/crl/comsignglobalrootca.crl00%URL Reputationsafe
                http://www.certplus.com/CRL/class3P.crl00%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.suscerte.gob.ve/dpc00%URL Reputationsafe
                http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
                http://www.disig.sk/ca/crl/ca_disig.crl00%URL Reputationsafe
                http://www.defence.gov.au/pki00%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.fontbureau.comgrito0%URL Reputationsafe
                http://www.sk.ee/cps/00%URL Reputationsafe
                http://www.globaltrust.info0=0%Avira URL Cloudsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                http://policy.camerfirma.com00%URL Reputationsafe
                http://www.ssc.lt/cps030%URL Reputationsafe
                http://ocsp.pki.gva.es00%URL Reputationsafe
                http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?0%URL Reputationsafe
                http://ca.mtin.es/mtin/ocsp00%URL Reputationsafe
                http://cps.letsencrypt.org00%URL Reputationsafe
                http://crl.ssc.lt/root-b/cacrl.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcacomb1.crl00%URL Reputationsafe
                http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G0%URL Reputationsafe
                https://wwww.certigna.fr/autorites/0m0%URL Reputationsafe
                http://philiphanson.org/medius/temp-transform0%Avira URL Cloudsafe
                http://www.dnie.es/dpc00%URL Reputationsafe
                http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf00%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://ca.mtin.es/mtin/DPCyPoliticas00%URL Reputationsafe
                http://www.carterandcone.como0%URL Reputationsafe
                http://www.globaltrust.info00%URL Reputationsafe
                http://www.certplus.com/CRL/class3TS.crl00%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://ac.economia.gob.mx/last.crl0G0%URL Reputationsafe
                http://LyFPshcnr7V.net0%Avira URL Cloudsafe
                https://www.catcert.net/verarrel0%URL Reputationsafe
                http://www.disig.sk/ca0f0%URL Reputationsafe
                http://www.founder.com.cn/cn-0%URL Reputationsafe
                http://www.sk.ee/juur/crl/00%URL Reputationsafe
                http://crl.chambersign.org/chambersignroot.crl00%URL Reputationsafe
                http://crl.xrampsecurity.com/XGCA.crl00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crl00%URL Reputationsafe
                http://crl.oces.trust2408.com/oces.crl00%URL Reputationsafe
                http://www.quovadis.bm00%URL Reputationsafe
                http://crl.ssc.lt/root-a/cacrl.crl00%URL Reputationsafe
                http://certs.oaticerts.com/repository/OATICA2.crl0%URL Reputationsafe
                http://www.trustdst.com/certificates/policy/ACES-index.html00%URL Reputationsafe
                http://certs.oati.net/repository/OATICA2.crt00%URL Reputationsafe
                http://www.accv.es000%URL Reputationsafe
                http://www.pkioverheid.nl/policies/root-policy-G200%URL Reputationsafe
                https://www.netlock.net/docs0%URL Reputationsafe
                http://www.e-trust.be/CPS/QNcerts0%URL Reputationsafe
                http://ocsp.ncdc.gov.sa00%URL Reputationsafe
                http://fedir.comsign.co.il/crl/ComSignCA.crl00%URL Reputationsafe
                http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl00%URL Reputationsafe
                http://web.ncdc.gov.sa/crl/nrcaparta1.crl0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.gpd-qatar.com
                50.87.253.110
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.org%GETOKSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  low
                  http://127.0.0.1:HTTP/1.1SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627807287.0000000005F75000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.certplus.com/CRL/class3.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.e-me.lv/repository0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.acabogacia.org/doc0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.chambersign.org/chambersroot.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.suscerte.gob.ve0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.postsignum.cz/crl/psrootqca2.crl02SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://crl.dhimyotis.com/certignarootca.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.chambersign.org1SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.pkioverheid.nl/policies/root-policy0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://repository.swisssign.com/0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497437781.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706213888.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497043630.0000000005F97000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499099053.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.suscerte.gob.ve/lcr0#SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.ssc.lt/root-c/cacrl.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.708046683.00000000067CF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627443158.00000000067CF000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://postsignum.ttc.cz/crl/psrootqca2.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ca.disig.sk/ca/crl/ca_disig.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.certplus.com/CRL/class3P.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.411626950.0000000005BEB000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.suscerte.gob.ve/dpc0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.certeurope.fr/reference/root2.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.certplus.com/CRL/class2.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.disig.sk/ca/crl/ca_disig.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://eca.hinet.net/repository/Certs/IssuedToThisCA.p7b05SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.defence.gov.au/pki0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.comgritoSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.448367203.00000000012D7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.sk.ee/cps/0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.globaltrust.info0=SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://www.anf.esSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.urwpp.deDPleaseSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://pki.registradores.org/normativa/index.htm0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://cps.root-x1.letsencrypt.org0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://policy.camerfirma.com0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.ssc.lt/cps03SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.708046683.00000000067CF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627443158.00000000067CF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://ocsp.pki.gva.es0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.anf.es/es/address-direccion.htmlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.anf.es/address/)1(0&SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://ca.mtin.es/mtin/ocsp0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://cps.letsencrypt.org0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.698029049.0000000002D22000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697854473.00000000030FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.ssc.lt/root-b/cacrl.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://web.ncdc.gov.sa/crl/nrcacomb1.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.certicamara.com/dpc/0ZSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0GSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.pki.wellsfargo.com/wsprca.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://wwww.certigna.fr/autorites/0mSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://philiphanson.org/medius/temp-transformbgnFA.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.dnie.es/dpc0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.627511724.0000000000AF6000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://ca.mtin.es/mtin/DPCyPoliticas0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://www.anf.es/AC/ANFServerCA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.carterandcone.comoSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.415362435.0000000005BDE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.globaltrust.info0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://certificates.starfieldtech.com/repository/1604SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://acedicom.edicomgroup.com/doc0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.certplus.com/CRL/class3TS.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499067814.0000000005F79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://crl.anf.es/AC/ANFServerCA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.carterandcone.comlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.certeurope.fr/reference/pc-root2.pdf0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497721282.0000000005EFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499223145.0000000005F75000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ac.economia.gob.mx/last.crl0GSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://LyFPshcnr7V.netbgnFA.exe, 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.698098173.0000000003121000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.698171434.000000000312A000.00000004.00000800.00020000.00000000.sdmp, bgnFA.exe, 0000000E.00000002.697762371.00000000030F7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.catcert.net/verarrelSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.disig.sk/ca0fSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.founder.com.cn/cn-SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000003.413853855.0000000005BD8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.e-szigno.hu/RootCA.crlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.sk.ee/juur/crl/0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://crl.chambersign.org/chambersignroot.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://crl.xrampsecurity.com/XGCA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497065018.0000000000AE3000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497616371.0000000000AEE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://certs.oati.net/repository/OATICA2.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://crl.oces.trust2408.com/oces.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://www.quovadis.bm0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://eca.hinet.net/repository0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.ssc.lt/root-a/cacrl.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://certs.oaticerts.com/repository/OATICA2.crlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.trustdst.com/certificates/policy/ACES-index.html0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496102748.0000000005FC8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://certs.oati.net/repository/OATICA2.crt0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.accv.es00SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.pkioverheid.nl/policies/root-policy-G20SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.netlock.net/docsSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.e-trust.be/CPS/QNcertsSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497585491.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.495605505.00000000067C5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706267699.0000000005FAC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://ocsp.ncdc.gov.sa0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              http://www.fontbureau.com/designersGSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://fedir.comsign.co.il/crl/ComSignCA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497226278.0000000005F7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.fontbureau.com/designers/?SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000000.00000002.454376754.0000000006DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497437781.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000002.706213888.0000000005F96000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.499099053.0000000005F96000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://web.ncdc.gov.sa/crl/nrcaparta1.crlSecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496752658.0000000005F9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  http://www.datev.de/zertifikat-policy-int0SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.497454262.0000000005F9B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496912081.0000000005F8E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.16858.exe, 00000006.00000003.496596703.0000000005FB4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    50.87.253.110
                                                                    mail.gpd-qatar.comUnited States
                                                                    46606UNIFIEDLAYER-AS-1USfalse
                                                                    IP
                                                                    192.168.2.1
                                                                    Joe Sandbox Version:35.0.0 Citrine
                                                                    Analysis ID:682147
                                                                    Start date and time:2022-08-11 06:30:12 +02:00
                                                                    Joe Sandbox Product:CloudBasic
                                                                    Overall analysis duration:0h 8m 37s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Sample file name:SecuriteInfo.com.W32.AIDetectNet.01.16858.8637 (renamed file extension from 8637 to exe)
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                    Number of analysed new started processes analysed:25
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • HDC enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@7/4@2/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HDC Information:Failed
                                                                    HCA Information:
                                                                    • Successful, ratio: 99%
                                                                    • Number of executed functions: 76
                                                                    • Number of non-executed functions: 3
                                                                    Cookbook Comments:
                                                                    • Adjust boot time
                                                                    • Enable AMSI
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 23.211.6.115, 209.197.3.8
                                                                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, arc.msn.com, wu-bg-shim.trafficmanager.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, licensing.mp.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    TimeTypeDescription
                                                                    06:31:25API Interceptor623x Sleep call for process: SecuriteInfo.com.W32.AIDetectNet.01.16858.exe modified
                                                                    06:31:39AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run bgnFA C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                    06:31:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run bgnFA C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                    06:32:03API Interceptor341x Sleep call for process: bgnFA.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                    50.87.253.110RFQ_512038573837.exeGet hashmaliciousBrowse
                                                                      SecuriteInfo.com.W32.AIDetectNet.01.27397.exeGet hashmaliciousBrowse
                                                                        SecuriteInfo.com.W32.AIDetectNet.01.18421.exeGet hashmaliciousBrowse
                                                                          SecuriteInfo.com.W32.AIDetectNet.01.25422.exeGet hashmaliciousBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            mail.gpd-qatar.comRFQ_512038573837.exeGet hashmaliciousBrowse
                                                                            • 50.87.253.110
                                                                            SecuriteInfo.com.W32.AIDetectNet.01.27397.exeGet hashmaliciousBrowse
                                                                            • 50.87.253.110
                                                                            SecuriteInfo.com.W32.AIDetectNet.01.18421.exeGet hashmaliciousBrowse
                                                                            • 50.87.253.110
                                                                            SecuriteInfo.com.W32.AIDetectNet.01.25422.exeGet hashmaliciousBrowse
                                                                            • 50.87.253.110
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                            UNIFIEDLAYER-AS-1USDoc11245.htmGet hashmaliciousBrowse
                                                                            • 162.240.215.126
                                                                            vBD1HySRYJGet hashmaliciousBrowse
                                                                            • 66.116.235.212
                                                                            HBL & MBL drafts.xlsxGet hashmaliciousBrowse
                                                                            • 192.185.162.134
                                                                            ark.exeGet hashmaliciousBrowse
                                                                            • 192.185.162.134
                                                                            Shipping Document. pdf.exeGet hashmaliciousBrowse
                                                                            • 162.241.24.224
                                                                            kMrqa6xL3uGet hashmaliciousBrowse
                                                                            • 76.162.184.144
                                                                            TT COPY.exeGet hashmaliciousBrowse
                                                                            • 162.241.217.198
                                                                            http://3vnw3unw.vddelbkc.theneighborhoodsite.com/afranco@drinkbodyarmor.comGet hashmaliciousBrowse
                                                                            • 162.241.114.244
                                                                            http://3vnw3unw.vddelbkc.theneighborhoodsite.comGet hashmaliciousBrowse
                                                                            • 162.241.114.244
                                                                            Past Due Inv_#.xlsxGet hashmaliciousBrowse
                                                                            • 69.49.234.191
                                                                            Past Due Inv_#.xlsxGet hashmaliciousBrowse
                                                                            • 69.49.234.191
                                                                            WCI Supply - Statement 09.08.2022.xlsxGet hashmaliciousBrowse
                                                                            • 162.240.23.83
                                                                            SecuriteInfo.com.Gen.Variant.Nemesis.9768.12528.exeGet hashmaliciousBrowse
                                                                            • 50.87.145.7
                                                                            https://osrahcm.telenoc.org/write/Get hashmaliciousBrowse
                                                                            • 108.167.152.103
                                                                            e2rbgORMRq.exeGet hashmaliciousBrowse
                                                                            • 192.254.211.36
                                                                            qCArmvz2mn.exeGet hashmaliciousBrowse
                                                                            • 192.185.224.36
                                                                            VbpkFO7qBC.exeGet hashmaliciousBrowse
                                                                            • 192.185.162.134
                                                                            order # 510266.xlsxGet hashmaliciousBrowse
                                                                            • 192.185.174.178
                                                                            Request Quotation.exeGet hashmaliciousBrowse
                                                                            • 162.241.148.128
                                                                            Overexcitable.exeGet hashmaliciousBrowse
                                                                            • 192.185.41.210
                                                                            No context
                                                                            No context
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1308
                                                                            Entropy (8bit):5.345811588615766
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                            Process:C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1308
                                                                            Entropy (8bit):5.345811588615766
                                                                            Encrypted:false
                                                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):1131008
                                                                            Entropy (8bit):7.058493037232615
                                                                            Encrypted:false
                                                                            SSDEEP:24576:AAi4vwHmQl/HrwmpStXqDrbWtOJqyp9hgi:ANHrw7aCOJJ
                                                                            MD5:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            SHA1:0E94379E76C28D605FD35C65369626A823924000
                                                                            SHA-256:342C1DE5E06E65EF00A4D5C0C39E4157D5B54268F3324D6DB17F76498B02A7C1
                                                                            SHA-512:4C188F028F2FE1D73E009B754C670CE6267FAB4CDBA288E75E544D8FA153F6A1AB1BC363BE69F5D7E713D672CC737CD2D69B67793E89C248352B4EBB7BB9CE8D
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Virustotal, Detection: 17%, Browse
                                                                            Reputation:low
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....b.b..............0......:......V$... ...@....@.. ....................................@..................................$..O....@...7........................................................................... ............... ..H............text...\.... ...................... ..`.rsrc....7...@...8..................@..@.reloc...............@..............@..B................8$......H...........L.......j....l.. ............................................0............{....o.....+..*f..{.....,..+.~ ...o!....*&...}....*....0..j........s"......{....o#...o$....+(.o%...t......o&.....,...o'...u....o(.....o)...-....u........,...o*........+...*..........4M........s"...}......}.....(+......(.....*..0..s.........{...........s,...o-......{....o.....+0..(/......o....s0......o1.....{....o#....o2...&...(3...-...........o*.....*.......&.=c.......0..+.........,..{......
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:modified
                                                                            Size (bytes):26
                                                                            Entropy (8bit):3.95006375643621
                                                                            Encrypted:false
                                                                            SSDEEP:3:ggPYV:rPYV
                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                            Malicious:true
                                                                            Reputation:high, very likely benign file
                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.058493037232615
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            File size:1131008
                                                                            MD5:dfe8f6d0b1fb5fb795f5596564ed5a60
                                                                            SHA1:0e94379e76c28d605fd35c65369626a823924000
                                                                            SHA256:342c1de5e06e65ef00a4d5c0c39e4157d5b54268f3324d6db17f76498b02a7c1
                                                                            SHA512:4c188f028f2fe1d73e009b754c670ce6267fab4cdba288e75e544d8fa153f6a1ab1bc363be69f5d7e713d672cc737cd2d69b67793e89c248352b4ebb7bb9ce8d
                                                                            SSDEEP:24576:AAi4vwHmQl/HrwmpStXqDrbWtOJqyp9hgi:ANHrw7aCOJJ
                                                                            TLSH:D2359DDEEA48C85ADD154B30E83948F05767BDA5F435D85F285BBC21BA7338E212AD03
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....b.b..............0......:......V$... ...@....@.. ....................................@................................
                                                                            Icon Hash:0f3135466416514c
                                                                            Entrypoint:0x4e2456
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x62F46281 [Thu Aug 11 01:59:29 2022 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xe24040x4f.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe40000x337a4.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000xe045c0xe0600False0.6771903290389972data7.433620851852969IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xe40000x337a40x33800False0.1639961316747573data4.093478798314193IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x1180000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0xe41600x33090data
                                                                            RT_GROUP_ICON0x1171f00x14data
                                                                            RT_GROUP_ICON0x1172040x14data
                                                                            RT_VERSION0x1172180x3a0data
                                                                            RT_MANIFEST0x1175b80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Aug 11, 2022 06:31:52.393898010 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:52.564441919 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:52.565962076 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:52.872816086 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:52.873655081 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.044276953 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.044578075 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.216497898 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.341092110 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.518033028 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.518070936 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.518093109 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.518110037 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.518186092 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.518229961 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.520034075 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.581407070 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:53.752665043 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:53.959604025 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:57.128820896 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:57.299420118 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.304728031 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:57.475887060 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.476553917 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:57.687643051 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.783134937 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.785454988 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:57.955754042 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.959969044 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:57.960346937 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.132647038 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.135360003 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.305826902 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.306900978 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.307035923 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.307812929 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.307898998 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:31:58.477329016 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.477361917 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.478331089 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.478370905 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.479069948 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:31:58.647525072 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:38.429254055 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:38.599436998 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:38.599688053 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:38.903387070 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:38.903830051 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.074331999 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.074683905 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.246436119 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.266998053 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.446536064 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.446569920 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.446587086 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.446599960 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.446610928 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.446913004 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.455908060 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.626528025 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.689002991 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:39.859565973 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:39.860413074 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.031085968 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.031702995 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.242882013 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.338757038 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.339184999 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.509526968 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.509551048 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.509987116 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.682395935 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.682790995 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.853790998 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:40.854865074 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.854993105 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.855067015 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:40.855168104 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:32:41.026067019 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:41.026170969 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:41.027707100 CEST5874985650.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:32:41.161303997 CEST49856587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:33:32.128531933 CEST49767587192.168.2.550.87.253.110
                                                                            Aug 11, 2022 06:33:32.339531898 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:33:32.771600962 CEST5874976750.87.253.110192.168.2.5
                                                                            Aug 11, 2022 06:33:32.772248030 CEST49767587192.168.2.550.87.253.110
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Aug 11, 2022 06:31:52.169194937 CEST5966153192.168.2.58.8.8.8
                                                                            Aug 11, 2022 06:31:52.350989103 CEST53596618.8.8.8192.168.2.5
                                                                            Aug 11, 2022 06:32:38.382360935 CEST6252553192.168.2.58.8.8.8
                                                                            Aug 11, 2022 06:32:38.401916981 CEST53625258.8.8.8192.168.2.5
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                                            Aug 11, 2022 06:31:52.169194937 CEST192.168.2.58.8.8.80x100eStandard query (0)mail.gpd-qatar.comA (IP address)IN (0x0001)
                                                                            Aug 11, 2022 06:32:38.382360935 CEST192.168.2.58.8.8.80xf46Standard query (0)mail.gpd-qatar.comA (IP address)IN (0x0001)
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                                            Aug 11, 2022 06:31:52.350989103 CEST8.8.8.8192.168.2.50x100eNo error (0)mail.gpd-qatar.com50.87.253.110A (IP address)IN (0x0001)
                                                                            Aug 11, 2022 06:32:38.401916981 CEST8.8.8.8192.168.2.50xf46No error (0)mail.gpd-qatar.com50.87.253.110A (IP address)IN (0x0001)
                                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                                            Aug 11, 2022 06:31:52.872816086 CEST5874976750.87.253.110192.168.2.5220-box2181.bluehost.com ESMTP Exim 4.95 #2 Wed, 10 Aug 2022 22:31:52 -0600
                                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                                            220 and/or bulk e-mail.
                                                                            Aug 11, 2022 06:31:52.873655081 CEST49767587192.168.2.550.87.253.110EHLO 320946
                                                                            Aug 11, 2022 06:31:53.044276953 CEST5874976750.87.253.110192.168.2.5250-box2181.bluehost.com Hello 320946 [102.129.143.3]
                                                                            250-SIZE 52428800
                                                                            250-8BITMIME
                                                                            250-PIPELINING
                                                                            250-PIPE_CONNECT
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-STARTTLS
                                                                            250 HELP
                                                                            Aug 11, 2022 06:31:53.044578075 CEST49767587192.168.2.550.87.253.110STARTTLS
                                                                            Aug 11, 2022 06:31:53.216497898 CEST5874976750.87.253.110192.168.2.5220 TLS go ahead
                                                                            Aug 11, 2022 06:32:38.903387070 CEST5874985650.87.253.110192.168.2.5220-box2181.bluehost.com ESMTP Exim 4.95 #2 Wed, 10 Aug 2022 22:32:38 -0600
                                                                            220-We do not authorize the use of this system to transport unsolicited,
                                                                            220 and/or bulk e-mail.
                                                                            Aug 11, 2022 06:32:38.903830051 CEST49856587192.168.2.550.87.253.110EHLO 320946
                                                                            Aug 11, 2022 06:32:39.074331999 CEST5874985650.87.253.110192.168.2.5250-box2181.bluehost.com Hello 320946 [102.129.143.3]
                                                                            250-SIZE 52428800
                                                                            250-8BITMIME
                                                                            250-PIPELINING
                                                                            250-PIPE_CONNECT
                                                                            250-AUTH PLAIN LOGIN
                                                                            250-STARTTLS
                                                                            250 HELP
                                                                            Aug 11, 2022 06:32:39.074683905 CEST49856587192.168.2.550.87.253.110STARTTLS
                                                                            Aug 11, 2022 06:32:39.246436119 CEST5874985650.87.253.110192.168.2.5220 TLS go ahead

                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:06:31:13
                                                                            Start date:11/08/2022
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe"
                                                                            Imagebase:0x810000
                                                                            File size:1131008 bytes
                                                                            MD5 hash:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.449409906.0000000002CDC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.451298378.0000000003D65000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.450695772.0000000002F57000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:6
                                                                            Start time:06:31:27
                                                                            Start date:11/08/2022
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.16858.exe
                                                                            Imagebase:0x4f0000
                                                                            File size:1131008 bytes
                                                                            MD5 hash:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.445181594.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.688305990.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:10
                                                                            Start time:06:31:47
                                                                            Start date:11/08/2022
                                                                            Path:C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe"
                                                                            Imagebase:0xd60000
                                                                            File size:1131008 bytes
                                                                            MD5 hash:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.539353757.000000000327C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.545607388.00000000034F7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Antivirus matches:
                                                                            • Detection: 17%, Virustotal, Browse
                                                                            Reputation:low

                                                                            Target ID:13
                                                                            Start time:06:31:58
                                                                            Start date:11/08/2022
                                                                            Path:C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe"
                                                                            Imagebase:0x9b0000
                                                                            File size:1131008 bytes
                                                                            MD5 hash:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Reputation:low

                                                                            Target ID:14
                                                                            Start time:06:32:10
                                                                            Start date:11/08/2022
                                                                            Path:C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\AppData\Roaming\bgnFA\bgnFA.exe
                                                                            Imagebase:0x9f0000
                                                                            File size:1131008 bytes
                                                                            MD5 hash:DFE8F6D0B1FB5FB795F5596564ED5A60
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.687783160.0000000002DA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:13.2%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:2.1%
                                                                              Total number of Nodes:189
                                                                              Total number of Limit Nodes:12
                                                                              execution_graph 26241 12c9bc8 26242 12c9c0a 26241->26242 26243 12c9c10 GetModuleHandleW 26241->26243 26242->26243 26244 12c9c3d 26243->26244 26245 51805b0 26246 51805d6 26245->26246 26250 51812a8 26246->26250 26256 51812a7 26246->26256 26251 51812d5 26250->26251 26252 5181307 26251->26252 26262 5181428 26251->26262 26267 5181430 26251->26267 26272 51814fc 26251->26272 26257 51812d5 26256->26257 26258 5181307 26257->26258 26259 5181428 2 API calls 26257->26259 26260 51814fc 2 API calls 26257->26260 26261 5181430 2 API calls 26257->26261 26259->26258 26260->26258 26261->26258 26264 5181430 26262->26264 26263 51814d0 26263->26252 26278 51814d8 26264->26278 26282 51814e8 26264->26282 26269 5181444 26267->26269 26268 51814d0 26268->26252 26270 51814d8 2 API calls 26269->26270 26271 51814e8 2 API calls 26269->26271 26270->26268 26271->26268 26273 51814ba 26272->26273 26274 518150a 26272->26274 26276 51814d8 2 API calls 26273->26276 26277 51814e8 2 API calls 26273->26277 26275 51814d0 26275->26252 26276->26275 26277->26275 26279 51814e8 26278->26279 26281 51814f9 26279->26281 26285 5182980 26279->26285 26281->26263 26283 51814f9 26282->26283 26284 5182980 2 API calls 26282->26284 26283->26263 26284->26283 26289 51829b0 26285->26289 26293 51829a9 26285->26293 26286 518299a 26286->26281 26290 51829f2 26289->26290 26292 51829f9 26289->26292 26291 5182a4a CallWindowProcW 26290->26291 26290->26292 26291->26292 26292->26286 26294 51829f2 26293->26294 26296 51829f9 26293->26296 26295 5182a4a CallWindowProcW 26294->26295 26294->26296 26295->26296 26296->26286 26299 5188640 26300 518866d 26299->26300 26305 5187eec 26300->26305 26302 51886f4 26309 5187f8c 26302->26309 26304 5188d88 26306 5187ef7 26305->26306 26307 518d295 26306->26307 26308 5187f8c 3 API calls 26306->26308 26307->26302 26308->26307 26310 5187f97 26309->26310 26315 12c6d90 26310->26315 26319 12c7343 26310->26319 26323 12c7410 26310->26323 26311 518d42c 26311->26304 26316 12c6d9b 26315->26316 26328 12c6dc0 26316->26328 26318 12c73ea 26318->26311 26320 12c7378 26319->26320 26321 12c6dc0 3 API calls 26320->26321 26322 12c73ea 26321->26322 26322->26311 26324 12c73de 26323->26324 26325 12c741f 26323->26325 26326 12c6dc0 3 API calls 26324->26326 26325->26311 26327 12c73ea 26326->26327 26327->26311 26329 12c6dcb 26328->26329 26331 12c7afe 26329->26331 26335 12c98ee 26329->26335 26339 12c98f0 26329->26339 26330 12c7b3c 26330->26318 26331->26330 26343 12cb9fb 26331->26343 26348 12c99e8 26335->26348 26353 12c99d7 26335->26353 26336 12c98ff 26336->26331 26340 12c98ff 26339->26340 26341 12c99e8 LoadLibraryExW 26339->26341 26342 12c99d7 LoadLibraryExW 26339->26342 26340->26331 26341->26340 26342->26340 26344 12cba29 26343->26344 26345 12cba4d 26344->26345 26371 12cbbb8 26344->26371 26375 12cbba7 26344->26375 26345->26330 26349 12c99fb 26348->26349 26350 12c9a0b 26349->26350 26359 12c9c70 26349->26359 26363 12c9c6b 26349->26363 26350->26336 26354 12c99e2 26353->26354 26355 12c9976 26353->26355 26356 12c9a0b 26354->26356 26357 12c9c6b LoadLibraryExW 26354->26357 26358 12c9c70 LoadLibraryExW 26354->26358 26355->26336 26356->26336 26357->26356 26358->26356 26360 12c9c84 26359->26360 26362 12c9ca9 26360->26362 26367 12c8d50 26360->26367 26362->26350 26364 12c9c84 26363->26364 26365 12c8d50 LoadLibraryExW 26364->26365 26366 12c9ca9 26364->26366 26365->26366 26366->26350 26368 12c9e50 LoadLibraryExW 26367->26368 26370 12c9ec9 26368->26370 26370->26362 26372 12cbbc5 26371->26372 26373 12cbbff 26372->26373 26379 12ca6cc 26372->26379 26373->26345 26376 12cbbb8 26375->26376 26377 12cbbff 26376->26377 26378 12ca6cc 3 API calls 26376->26378 26377->26345 26378->26377 26380 12ca6d7 26379->26380 26382 12cc8f8 26380->26382 26383 12cbf44 26380->26383 26382->26382 26384 12cbf4f 26383->26384 26385 12c6dc0 3 API calls 26384->26385 26386 12cc967 26384->26386 26385->26386 26390 12ce6d8 26386->26390 26399 12ce6f0 26386->26399 26387 12cc9a0 26387->26382 26392 12ce812 26390->26392 26393 12ce721 26390->26393 26391 12ce72d 26391->26387 26392->26387 26393->26391 26408 12ceb70 26393->26408 26411 12ceb61 26393->26411 26394 12ce76d 26414 12cf538 26394->26414 26419 12cf537 26394->26419 26401 12ce721 26399->26401 26403 12ce812 26399->26403 26400 12ce72d 26400->26387 26401->26400 26406 12ceb70 LoadLibraryExW 26401->26406 26407 12ceb61 LoadLibraryExW 26401->26407 26402 12ce76d 26404 12cf538 2 API calls 26402->26404 26405 12cf537 2 API calls 26402->26405 26403->26387 26404->26403 26405->26403 26406->26402 26407->26402 26409 12c99e8 LoadLibraryExW 26408->26409 26410 12ceb79 26408->26410 26409->26410 26410->26394 26412 12c99e8 LoadLibraryExW 26411->26412 26413 12ceb79 26412->26413 26413->26394 26415 12cf562 26414->26415 26416 12cf609 26415->26416 26424 51803a8 26415->26424 26428 51803a5 26415->26428 26420 12cf562 26419->26420 26421 12cf609 26420->26421 26422 51803a8 2 API calls 26420->26422 26423 51803a5 2 API calls 26420->26423 26422->26421 26423->26421 26426 51803f8 CreateWindowExW 26424->26426 26427 51803ef CreateWindowExW 26424->26427 26425 51803dd 26425->26416 26426->26425 26427->26425 26429 51803dd 26428->26429 26430 51803f8 CreateWindowExW 26428->26430 26431 51803ef CreateWindowExW 26428->26431 26429->26416 26430->26429 26431->26429 26432 5180640 SetWindowLongW 26433 51806ac 26432->26433 26297 12cc300 DuplicateHandle 26298 12cc396 26297->26298 26434 12c40d0 26435 12c40e2 26434->26435 26436 12c40ee 26435->26436 26440 12c41e0 26435->26440 26445 12c38a0 26436->26445 26438 12c410d 26441 12c4205 26440->26441 26449 12c42df 26441->26449 26453 12c42e0 26441->26453 26446 12c38ab 26445->26446 26461 12c57e4 26446->26461 26448 12c6b30 26448->26438 26451 12c4307 26449->26451 26450 12c43e4 26450->26450 26451->26450 26457 12c3ea0 26451->26457 26454 12c4307 26453->26454 26455 12c43e4 26454->26455 26456 12c3ea0 CreateActCtxA 26454->26456 26455->26455 26456->26455 26458 12c5370 CreateActCtxA 26457->26458 26460 12c5433 26458->26460 26462 12c57ef 26461->26462 26465 12c58b8 26462->26465 26464 12c7215 26464->26448 26466 12c58c3 26465->26466 26467 12c6d90 3 API calls 26466->26467 26468 12c72fa 26467->26468 26468->26464 26469 12cbcd0 GetCurrentProcess 26470 12cbd4a GetCurrentThread 26469->26470 26471 12cbd43 26469->26471 26472 12cbd87 GetCurrentProcess 26470->26472 26473 12cbd80 26470->26473 26471->26470 26476 12cbdbd 26472->26476 26473->26472 26474 12cbde5 GetCurrentThreadId 26475 12cbe16 26474->26475 26476->26474

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 5188640-518866b 1 518866d 0->1 2 5188672-518bf0e call 5187eec call 5187efc * 22 call 5187f0c call 5187f1c call 5187efc * 5 call 5187f2c call 5187f3c call 5187f4c call 5187f5c call 5187f4c call 5187f6c call 5187f4c call 5187f7c call 5187f8c call 5187f9c * 2 call 5187fac call 5187f9c call 5187fac call 5187f9c * 2 call 5187fac call 5187f9c call 5187fbc call 5187fcc call 5187efc call 5187fdc call 5187fec call 5187ffc call 518800c call 518801c call 518802c call 518803c call 518804c call 518805c call 518806c * 2 call 518807c call 518808c call 518805c call 518806c * 2 call 518808c call 518805c call 518806c * 2 call 518808c call 518806c call 518808c call 518806c call 518808c call 518806c call 518807c call 518808c call 518806c call 518808c call 518806c call 518808c call 518805c call 518806c * 2 call 518807c call 518808c call 518806c call 518807c call 518808c call 518805c call 518806c * 2 call 518808c call 518806c call 518808c call 518806c call 518808c call 518806c call 518805c call 518806c * 2 call 518808c call 518806c call 518808c call 518809c call 51880ac call 51880bc call 518801c call 518802c call 518803c call 518804c call 51880cc call 51880dc call 51880ec call 51880fc call 518802c call 518803c call 518806c call 518808c call 518806c call 518808c call 518806c call 518808c call 518806c call 518808c call 518806c call 518807c call 518808c call 518810c call 518811c call 518801c call 518802c call 5187fdc call 518812c call 5187fec call 518812c call 518803c call 518813c call 518804c call 518812c * 3 call 518801c call 518802c call 518814c call 518803c call 518804c call 518812c call 518815c call 518802c call 518816c call 518803c call 518817c call 518818c call 518801c call 518802c call 518803c call 518804c call 518819c call 518812c call 518815c call 518802c call 518816c call 518803c call 518817c call 518818c call 518801c call 518802c call 51881ac call 518803c call 518804c call 518812c call 518815c call 518802c call 518816c call 518803c call 518817c call 518818c call 51881bc call 518801c call 518802c call 51881cc call 518803c call 518804c call 51881dc call 51881ec call 51881fc call 518801c call 518802c call 518803c call 518804c 0->2 1->2 762 518bf38 2->762 763 518bf10-518bf1c 2->763 766 518bf3e-518c0b6 call 518820c call 518806c call 518808c 762->766 764 518bf1e-518bf24 763->764 765 518bf26-518bf2c 763->765 767 518bf36 764->767 765->767 783 518c0b8-518c0c4 766->783 784 518c0e0 766->784 767->766 786 518c0ce-518c0d4 783->786 787 518c0c6-518c0cc 783->787 785 518c0e6-518c2ca call 518820c call 518806c call 518808c call 518806c 784->785 808 518c2cc-518c2d8 785->808 809 518c2f4 785->809 788 518c0de 786->788 787->788 788->785 810 518c2da-518c2e0 808->810 811 518c2e2-518c2e8 808->811 812 518c2fa-518c4f5 call 518820c call 518806c call 518808c call 518806c 809->812 813 518c2f2 810->813 811->813 834 518c51f 812->834 835 518c4f7-518c503 812->835 813->812 838 518c525-518c6b4 call 518820c call 518806c call 518808c 834->838 836 518c50d-518c513 835->836 837 518c505-518c50b 835->837 839 518c51d 836->839 837->839 856 518c6de 838->856 857 518c6b6-518c6c2 838->857 839->838 860 518c6e4-518c8c8 call 518820c call 518806c call 518808c call 518806c 856->860 858 518c6cc-518c6d2 857->858 859 518c6c4-518c6ca 857->859 861 518c6dc 858->861 859->861 881 518c8ca-518c8d6 860->881 882 518c8f2 860->882 861->860 883 518c8d8-518c8de 881->883 884 518c8e0-518c8e6 881->884 885 518c8f8-518cf4a call 518820c call 518806c call 518808c call 5188230 call 5188240 call 5188250 call 5187ffc call 518812c call 5187ffc call 518803c call 5188260 call 5188240 call 5188270 call 518801c call 518802c call 5188280 call 5188240 call 5188290 call 518803c call 518804c call 518800c call 518812c call 51882a0 call 51882b0 call 518806c call 518808c call 51882c0 call 51882d0 call 51882e0 call 518812c * 2 882->885 886 518c8f0 883->886 884->886 976 518cf4c-518cf58 885->976 977 518cf74 885->977 886->885 979 518cf5a-518cf60 976->979 980 518cf62-518cf68 976->980 978 518cf7a-518d206 call 51882f0 call 5188300 call 518802c call 5188310 call 5188320 call 5188330 call 5187fdc call 5187fec call 5188330 * 2 call 5187ffc call 518800c * 2 call 5188330 977->978 1027 518d20b-518d230 call 5188330 978->1027 981 518cf72 979->981 980->981 981->978 1030 518d235-518d23c 1027->1030 1031 518d243-518d257 call 5188330 1030->1031
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql
                                                                              • API String ID: 0-896137311
                                                                              • Opcode ID: e52924d50e919c90dbfab2490009cdb05757eec262154e0b8200deed33f5ef7b
                                                                              • Instruction ID: 6e80ad28b4d1159a6a37b99cebc1fd48425c933a2c22d79876c4f2d7d5380420
                                                                              • Opcode Fuzzy Hash: e52924d50e919c90dbfab2490009cdb05757eec262154e0b8200deed33f5ef7b
                                                                              • Instruction Fuzzy Hash: BFA3C634A00659CFC768EF24C894AAAB7B2FF89305F5145E9D54DAB361DB31AE81CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql$$%ql
                                                                              • API String ID: 0-896137311
                                                                              • Opcode ID: b9c371883b909102a82db09cb2e3c8084dd2595246346b142611cabdef04924c
                                                                              • Instruction ID: 3cc466fcb0855a96ea2d6b1264738780614cac873a15b788584d3e235192c341
                                                                              • Opcode Fuzzy Hash: b9c371883b909102a82db09cb2e3c8084dd2595246346b142611cabdef04924c
                                                                              • Instruction Fuzzy Hash: EAA3C634A00659CFC764EF24C894AAAB7B2FF89301F5146E9D54DAB361DB31AE81CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2075 12cbcc3-12cbd41 GetCurrentProcess 2076 12cbd4a-12cbd7e GetCurrentThread 2075->2076 2077 12cbd43-12cbd49 2075->2077 2078 12cbd87-12cbdbb GetCurrentProcess 2076->2078 2079 12cbd80-12cbd86 2076->2079 2077->2076 2081 12cbdbd-12cbdc3 2078->2081 2082 12cbdc4-12cbddf call 12cbe88 2078->2082 2079->2078 2081->2082 2085 12cbde5-12cbe14 GetCurrentThreadId 2082->2085 2086 12cbe1d-12cbe7f 2085->2086 2087 12cbe16-12cbe1c 2085->2087 2087->2086
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 012CBD30
                                                                              • GetCurrentThread.KERNEL32 ref: 012CBD6D
                                                                              • GetCurrentProcess.KERNEL32 ref: 012CBDAA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 012CBE03
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: 26ff5de35cd5fde573f254af4e3b4113af65c63ff1580e8fec6b9046a44fbaac
                                                                              • Instruction ID: 7d804f53648dde1d799966d0ca576aff6aa898b64c905dd7dcaf18f478e53782
                                                                              • Opcode Fuzzy Hash: 26ff5de35cd5fde573f254af4e3b4113af65c63ff1580e8fec6b9046a44fbaac
                                                                              • Instruction Fuzzy Hash: E45156B49046498FDB14CFA9C6487DEBBF1BF49314F248A9EE509A7290C7345844CF66
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2094 12cbcd0-12cbd41 GetCurrentProcess 2095 12cbd4a-12cbd7e GetCurrentThread 2094->2095 2096 12cbd43-12cbd49 2094->2096 2097 12cbd87-12cbdbb GetCurrentProcess 2095->2097 2098 12cbd80-12cbd86 2095->2098 2096->2095 2100 12cbdbd-12cbdc3 2097->2100 2101 12cbdc4-12cbddf call 12cbe88 2097->2101 2098->2097 2100->2101 2104 12cbde5-12cbe14 GetCurrentThreadId 2101->2104 2105 12cbe1d-12cbe7f 2104->2105 2106 12cbe16-12cbe1c 2104->2106 2106->2105
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 012CBD30
                                                                              • GetCurrentThread.KERNEL32 ref: 012CBD6D
                                                                              • GetCurrentProcess.KERNEL32 ref: 012CBDAA
                                                                              • GetCurrentThreadId.KERNEL32 ref: 012CBE03
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Current$ProcessThread
                                                                              • String ID:
                                                                              • API String ID: 2063062207-0
                                                                              • Opcode ID: bb3d6b7698c7183441e75d038e50aa2f712a4353624340802b6d1f1dc5b3a236
                                                                              • Instruction ID: 8d8c847047cd655494fd6096916058bc13e316b7866df02e529f6a22271b5212
                                                                              • Opcode Fuzzy Hash: bb3d6b7698c7183441e75d038e50aa2f712a4353624340802b6d1f1dc5b3a236
                                                                              • Instruction Fuzzy Hash: 1D5146B49006498FDB14CFA9D548BDEBBF1BF49314F20865DE509A7390DB345844CF66
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3037 51803f8-518045e 3038 5180469-5180470 3037->3038 3039 5180460-5180466 3037->3039 3040 518047b-518051a CreateWindowExW 3038->3040 3041 5180472-5180478 3038->3041 3039->3038 3043 518051c-5180522 3040->3043 3044 5180523-518055b 3040->3044 3041->3040 3043->3044 3048 5180568 3044->3048 3049 518055d-5180560 3044->3049 3050 5180569 3048->3050 3049->3048 3050->3050
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0518050A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: fae179a904b62b20d3f3ea7ff64c474cdf276036d057e56db9c156930d32a1e4
                                                                              • Instruction ID: c22661ad5c0967610b4a4cffb6880844224b35e34838c5c4ec4deda48986453f
                                                                              • Opcode Fuzzy Hash: fae179a904b62b20d3f3ea7ff64c474cdf276036d057e56db9c156930d32a1e4
                                                                              • Instruction Fuzzy Hash: 2B41B1B1D0030DDFDB14DF99C984ADEBBB5BF48314F24822AE419AB210D7759989CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3023 51803ef-518045e 3024 5180469-5180470 3023->3024 3025 5180460-5180466 3023->3025 3026 518047b-518051a CreateWindowExW 3024->3026 3027 5180472-5180478 3024->3027 3025->3024 3029 518051c-5180522 3026->3029 3030 5180523-518055b 3026->3030 3027->3026 3029->3030 3034 5180568 3030->3034 3035 518055d-5180560 3030->3035 3036 5180569 3034->3036 3035->3034 3036->3036
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0518050A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: c328ab0e276041bb6383d24de5f960f22518cfa4816ca4652f4b721f9521c0db
                                                                              • Instruction ID: ee5466b048c688c0ea7a4c0f9d98e9cfd968794de0fdcf7524363e81f278de73
                                                                              • Opcode Fuzzy Hash: c328ab0e276041bb6383d24de5f960f22518cfa4816ca4652f4b721f9521c0db
                                                                              • Instruction Fuzzy Hash: 3C51C1B1D04309DFDF14DFA9C984ADDBBB5BF48310F25822AE419AB210D7749989CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3051 12c3ea0-12c5431 CreateActCtxA 3054 12c543a-12c5494 3051->3054 3055 12c5433-12c5439 3051->3055 3062 12c5496-12c5499 3054->3062 3063 12c54a3-12c54a7 3054->3063 3055->3054 3062->3063 3064 12c54b8 3063->3064 3065 12c54a9-12c54b5 3063->3065 3067 12c54b9 3064->3067 3065->3064 3067->3067
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 012C5421
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: e07d93fdddb9bd32a29a3fc4265cf4c9787af6a67320a36d648de8c6b76824ea
                                                                              • Instruction ID: 77e1a21ca25c576f0270b0edbdb4311b951b89f58780c6d5e89d720e3b34ebcf
                                                                              • Opcode Fuzzy Hash: e07d93fdddb9bd32a29a3fc4265cf4c9787af6a67320a36d648de8c6b76824ea
                                                                              • Instruction Fuzzy Hash: CC41E4B1D0461DCBDB24DFA9C84478EFBB5FF88704F208169D509AB250DB75694ACF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 05182A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CallProcWindow
                                                                              • String ID:
                                                                              • API String ID: 2714655100-0
                                                                              • Opcode ID: cb48243c5442d4ed962d83ed1a69eaf56f7665343fea1a21075c163f848a3f78
                                                                              • Instruction ID: 64f7701bef8e83aa9d568c10391b5c65f39a7bdcfb61f39f263353d0dd5408af
                                                                              • Opcode Fuzzy Hash: cb48243c5442d4ed962d83ed1a69eaf56f7665343fea1a21075c163f848a3f78
                                                                              • Instruction Fuzzy Hash: 2F4149B8A00209CFCB24DF89C488BAABBF5FF88314F158599D519A7321D774A845CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3068 12c536b-12c5431 CreateActCtxA 3070 12c543a-12c5494 3068->3070 3071 12c5433-12c5439 3068->3071 3078 12c5496-12c5499 3070->3078 3079 12c54a3-12c54a7 3070->3079 3071->3070 3078->3079 3080 12c54b8 3079->3080 3081 12c54a9-12c54b5 3079->3081 3083 12c54b9 3080->3083 3081->3080 3083->3083
                                                                              APIs
                                                                              • CreateActCtxA.KERNEL32(?), ref: 012C5421
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Create
                                                                              • String ID:
                                                                              • API String ID: 2289755597-0
                                                                              • Opcode ID: 38bc7e0fa2fea938ad0ae76e45b31f9e650bd3409f54c7f4fc34320f8ead2844
                                                                              • Instruction ID: 55233e929863700577952bdd6e4f7feafa866496bc8f03a6939cf13ad9d10adc
                                                                              • Opcode Fuzzy Hash: 38bc7e0fa2fea938ad0ae76e45b31f9e650bd3409f54c7f4fc34320f8ead2844
                                                                              • Instruction Fuzzy Hash: B141E471D04619CFDB24CFA9C8447CDBBB5FF89708F208169D508AB251DB75694ACF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012CC387
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 9abc53e1eabc49ef35b7bf3df612ca14ba0f3200fdcfa6959ce6221b8db09112
                                                                              • Instruction ID: 5d067a202360335fcfde1facdc6fb609adbe00b5b9f20075f2391c67b3546a62
                                                                              • Opcode Fuzzy Hash: 9abc53e1eabc49ef35b7bf3df612ca14ba0f3200fdcfa6959ce6221b8db09112
                                                                              • Instruction Fuzzy Hash: 1B21E3B5900209DFDB00CFA9D984ADEBBF4FF48320F15851AE918A3350D378A954CF61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 012CC387
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: d37d6254d26cc7e13860e45714968d772f5cc24ff4f0f6e41d68345cb19c39d5
                                                                              • Instruction ID: 3f8aa2801a42bba7c00f60c764aecedbe43bac69ef97c368bb34f3fbd46718a9
                                                                              • Opcode Fuzzy Hash: d37d6254d26cc7e13860e45714968d772f5cc24ff4f0f6e41d68345cb19c39d5
                                                                              • Instruction Fuzzy Hash: 6321D3B5900259DFDB10CFAAD984ADEFBF8FB48324F14851AE918A3350D374A954CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012C9CA9,00000800,00000000,00000000), ref: 012C9EBA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 9575207ad7b956e49984d52d47b9396cc397f30d0af90aa8ba78742ff84d9fe7
                                                                              • Instruction ID: 5b6c3f56b903fae8010f74f668f328cb8392e8df801205ab80121ebd7cab049f
                                                                              • Opcode Fuzzy Hash: 9575207ad7b956e49984d52d47b9396cc397f30d0af90aa8ba78742ff84d9fe7
                                                                              • Instruction Fuzzy Hash: F91114B29042098FDB10CF9AC444BDEFBF4EB98724F04852EE615B7200C375A945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,012C9CA9,00000800,00000000,00000000), ref: 012C9EBA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 4f8ae71635211c413c5cd5fcce62041ddb74e57afadfde7b583b6f0925d9f770
                                                                              • Instruction ID: fe6a8f89549e81419ed6deb981cf9cc8c69a8ff1a02aace552c1acd794b3658c
                                                                              • Opcode Fuzzy Hash: 4f8ae71635211c413c5cd5fcce62041ddb74e57afadfde7b583b6f0925d9f770
                                                                              • Instruction Fuzzy Hash: EE2144B2C002098FDB10CFAAC484ADEFBF4EB98324F14862ED515A7240C374A546CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 012C9C2E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: d767f1788d67dbec35f0457e8322b7162a50ecc96bc8a30a2555a194bc7f93b9
                                                                              • Instruction ID: 7fb9f6c4af47aed8a4ae31aaf6efea69b1d8a598aa3d8a82a148dcb28b5d7deb
                                                                              • Opcode Fuzzy Hash: d767f1788d67dbec35f0457e8322b7162a50ecc96bc8a30a2555a194bc7f93b9
                                                                              • Instruction Fuzzy Hash: 311110B2C006498FDB10CF9AC444BDEFBF4AB88324F10851AD919A7200C378A685CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowLongW.USER32(?,?,?), ref: 0518069D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow
                                                                              • String ID:
                                                                              • API String ID: 1378638983-0
                                                                              • Opcode ID: f4d1bb1787a919c5dfc437ec5596e17d28fabf1373578cb39b77e875aee2b21a
                                                                              • Instruction ID: 2cc3c5a510e547714d6b49c95d59027f594ba0c90e6e36dce2179b2bfdcfa536
                                                                              • Opcode Fuzzy Hash: f4d1bb1787a919c5dfc437ec5596e17d28fabf1373578cb39b77e875aee2b21a
                                                                              • Instruction Fuzzy Hash: B911F2B58006498FDB20DF99D589BDEBBF8FB48320F24854AD955A7740C378A948CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowLongW.USER32(?,?,?), ref: 0518069D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.452606678.0000000005180000.00000040.00000800.00020000.00000000.sdmp, Offset: 05180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_5180000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow
                                                                              • String ID:
                                                                              • API String ID: 1378638983-0
                                                                              • Opcode ID: 9b1a7da30ede3264bf8924a3e005944227d23c752c5dcda488c414501c0d8d0b
                                                                              • Instruction ID: c7ed5b0c82d5ac2611ef9f3db8fa728fb06f00d693dea7ab3d1dae57cc5b125f
                                                                              • Opcode Fuzzy Hash: 9b1a7da30ede3264bf8924a3e005944227d23c752c5dcda488c414501c0d8d0b
                                                                              • Instruction Fuzzy Hash: 251112B58002098FDB20DF9AD589BDEBBF8FB88320F20851AD915A3340C374A944CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8f7b1ec65b0b442d4438fabb9b9a72cce0be1583c06601c4a50ee91b5300ee41
                                                                              • Instruction ID: 168dff6434943a97be618cd6d63a213396a62b2988ef36035e44e087dc387a67
                                                                              • Opcode Fuzzy Hash: 8f7b1ec65b0b442d4438fabb9b9a72cce0be1583c06601c4a50ee91b5300ee41
                                                                              • Instruction Fuzzy Hash: 7A12C5F1C91B468BD3B4CF65E9882893BA1B7453A8BD14A08D3711BAD1D7B4117ECF48
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ba507423393261737083abf09444af2221c46b43895973c37456b7b4a41ff6b6
                                                                              • Instruction ID: ca06c166630533bcdae03f5096a07c84c943a52e38d22dc8ccd5444e3609ef9e
                                                                              • Opcode Fuzzy Hash: ba507423393261737083abf09444af2221c46b43895973c37456b7b4a41ff6b6
                                                                              • Instruction Fuzzy Hash: 1DA16032E1061A8FCF15DFB5C8445EDBBB3FF88700B15866AEA05AB261DB31A955CB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.448286064.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_12c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 817cd73842af8bb9c3446d595a96f2fbc06450fef8f1a98090ee412e63b49467
                                                                              • Instruction ID: 8df9d3919873e783b70a308083c2eea263edd49a930ed73f429e993a45a6b1fc
                                                                              • Opcode Fuzzy Hash: 817cd73842af8bb9c3446d595a96f2fbc06450fef8f1a98090ee412e63b49467
                                                                              • Instruction Fuzzy Hash: E6C13DF1C91B468BD3A4CF65E8881897B71BB853A8FD14B08D3616BAD1D7B4107ACF44
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:16.3%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:1.4%
                                                                              Total number of Nodes:354
                                                                              Total number of Limit Nodes:35
                                                                              execution_graph 59281 28140b0 59282 28140c4 59281->59282 59285 2814702 59282->59285 59283 28140cd 59286 281470b 59285->59286 59291 28148e4 59285->59291 59296 28148fe 59285->59296 59301 28147e8 59285->59301 59306 28147d8 59285->59306 59286->59283 59292 2814897 59291->59292 59293 2814923 59292->59293 59311 2814bf0 59292->59311 59316 2814be3 59292->59316 59297 2814911 59296->59297 59298 2814923 59296->59298 59299 2814bf0 2 API calls 59297->59299 59300 2814be3 2 API calls 59297->59300 59299->59298 59300->59298 59302 281482c 59301->59302 59303 2814923 59302->59303 59304 2814bf0 2 API calls 59302->59304 59305 2814be3 2 API calls 59302->59305 59304->59303 59305->59303 59307 28147dc 59306->59307 59308 2814923 59307->59308 59309 2814bf0 2 API calls 59307->59309 59310 2814be3 2 API calls 59307->59310 59309->59308 59310->59308 59312 2814bfe 59311->59312 59321 2814c30 59312->59321 59325 2814c40 59312->59325 59313 2814c0e 59313->59293 59317 2814bec 59316->59317 59319 2814c30 RtlEncodePointer 59317->59319 59320 2814c40 RtlEncodePointer 59317->59320 59318 2814c0e 59318->59293 59319->59318 59320->59318 59322 2814c34 59321->59322 59323 2814ca4 RtlEncodePointer 59322->59323 59324 2814ccd 59322->59324 59323->59324 59324->59313 59326 2814c7a 59325->59326 59327 2814ca4 RtlEncodePointer 59326->59327 59328 2814ccd 59326->59328 59327->59328 59328->59313 59329 281ad30 59330 281ad4e 59329->59330 59333 281ac7c 59330->59333 59332 281ad85 59334 281c850 LoadLibraryA 59333->59334 59336 281c92c 59334->59336 59037 63c6b98 59039 63c6bad 59037->59039 59038 63c6e8c 59039->59038 59040 63c7ef8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 59039->59040 59041 63c7ee7 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 59039->59041 59045 63c6ea8 59039->59045 59052 63c7040 59039->59052 59056 63c80db 59039->59056 59040->59039 59041->59039 59046 63c6ec9 59045->59046 59047 63c6eec 59045->59047 59046->59039 59048 63c6f16 59047->59048 59061 63c7108 59047->59061 59069 63c70f9 59047->59069 59048->59039 59049 63c7067 59049->59039 59053 63c7067 59052->59053 59054 63c7108 4 API calls 59052->59054 59055 63c70f9 4 API calls 59052->59055 59053->59039 59054->59053 59055->59053 59057 63c80dc 59056->59057 59058 63c811e 59057->59058 59059 63c83f8 4 API calls 59057->59059 59060 63c83e8 4 API calls 59057->59060 59058->59039 59059->59058 59060->59058 59062 63c711c 59061->59062 59064 63c715a 59061->59064 59065 63c7108 4 API calls 59062->59065 59066 63c70f9 4 API calls 59062->59066 59063 63c7132 59077 63c7ef8 59063->59077 59086 63c7ee7 59063->59086 59064->59049 59065->59063 59066->59063 59070 63c711c 59069->59070 59072 63c715a 59069->59072 59075 63c7108 4 API calls 59070->59075 59076 63c70f9 4 API calls 59070->59076 59071 63c7132 59073 63c7ef8 4 API calls 59071->59073 59074 63c7ee7 4 API calls 59071->59074 59072->59049 59073->59072 59074->59072 59075->59071 59076->59071 59078 63c7f03 59077->59078 59079 63c7f2b 59077->59079 59078->59064 59079->59078 59080 63c801f 59079->59080 59083 63c802d 59079->59083 59081 63c7040 4 API calls 59080->59081 59082 63c8026 59081->59082 59082->59064 59083->59082 59095 63c83f8 59083->59095 59100 63c83e8 59083->59100 59087 63c7f03 59086->59087 59088 63c7f2b 59086->59088 59087->59064 59088->59087 59089 63c801f 59088->59089 59092 63c802d 59088->59092 59090 63c7040 4 API calls 59089->59090 59091 63c8026 59090->59091 59091->59064 59092->59091 59093 63c83f8 4 API calls 59092->59093 59094 63c83e8 4 API calls 59092->59094 59093->59091 59094->59091 59105 63c87e8 59095->59105 59114 63c88c0 59095->59114 59122 63c8830 59095->59122 59096 63c8406 59096->59082 59101 63c8406 59100->59101 59102 63c87e8 2 API calls 59100->59102 59103 63c8830 2 API calls 59100->59103 59104 63c88c0 2 API calls 59100->59104 59101->59082 59102->59101 59103->59101 59104->59101 59106 63c883d 59105->59106 59108 63c8865 59105->59108 59106->59096 59109 63c8886 59108->59109 59111 63c88d6 59108->59111 59131 63c842c 59108->59131 59109->59096 59110 63c88eb 59110->59096 59111->59110 59112 63c894e GlobalMemoryStatusEx 59111->59112 59113 63c897e 59112->59113 59113->59096 59117 63c88d6 59114->59117 59121 63c8869 59114->59121 59115 63c88eb 59115->59096 59116 63c842c GlobalMemoryStatusEx 59116->59121 59117->59115 59119 63c894e GlobalMemoryStatusEx 59117->59119 59118 63c8886 59118->59096 59120 63c897e 59119->59120 59120->59096 59121->59116 59121->59117 59121->59118 59123 63c883d 59122->59123 59126 63c8865 59122->59126 59123->59096 59124 63c842c GlobalMemoryStatusEx 59124->59126 59125 63c8886 59125->59096 59126->59124 59126->59125 59128 63c88d6 59126->59128 59127 63c88eb 59127->59096 59128->59127 59129 63c894e GlobalMemoryStatusEx 59128->59129 59130 63c897e 59129->59130 59130->59096 59132 63c8908 GlobalMemoryStatusEx 59131->59132 59134 63c897e 59132->59134 59134->59108 59358 63c3578 59359 63c3597 LdrInitializeThunk 59358->59359 59361 63c35cb 59359->59361 59362 63cece8 59363 63cecf3 59362->59363 59365 63ced03 59363->59365 59366 63ce014 59363->59366 59367 63ced38 OleInitialize 59366->59367 59369 63ced9c 59367->59369 59369->59365 59382 63c99c8 59383 63c99db 59382->59383 59386 63c8470 59383->59386 59385 63c99e6 59387 63c847b 59386->59387 59388 63c9a52 59387->59388 59391 63c9a68 59387->59391 59406 63c9a57 59387->59406 59388->59385 59392 63c9a8a 59391->59392 59393 63c9b93 59392->59393 59394 63c862c GetModuleHandleW 59392->59394 59393->59388 59395 63c9ce4 59394->59395 59400 63c862c GetModuleHandleW 59395->59400 59421 63ca0d0 59395->59421 59426 63ca180 59395->59426 59396 63c9d00 59397 63c863c GetModuleHandleW 59396->59397 59399 63c9d29 59396->59399 59398 63c9d53 59397->59398 59431 63cb590 59398->59431 59434 63cb559 59398->59434 59443 63cb5c0 59398->59443 59400->59396 59408 63c9a8a 59406->59408 59407 63c9b93 59407->59388 59408->59407 59409 63c862c GetModuleHandleW 59408->59409 59410 63c9ce4 59409->59410 59415 63c862c GetModuleHandleW 59410->59415 59416 63ca0d0 GetModuleHandleW 59410->59416 59417 63ca180 GetModuleHandleW 59410->59417 59411 63c9d00 59412 63c863c GetModuleHandleW 59411->59412 59414 63c9d29 59411->59414 59413 63c9d53 59412->59413 59418 63cb559 2 API calls 59413->59418 59419 63cb590 CreateWindowExW 59413->59419 59420 63cb5c0 CreateWindowExW 59413->59420 59415->59411 59416->59411 59417->59411 59418->59414 59419->59414 59420->59414 59422 63ca0de 59421->59422 59423 63ca0eb 59422->59423 59424 63ca2f0 GetModuleHandleW 59422->59424 59425 63ca2e0 GetModuleHandleW 59422->59425 59423->59396 59424->59423 59425->59423 59427 63ca18e 59426->59427 59428 63ca22e 59427->59428 59429 63ca2f0 GetModuleHandleW 59427->59429 59430 63ca2e0 GetModuleHandleW 59427->59430 59429->59428 59430->59428 59432 63cb5f5 59431->59432 59446 63c8714 59431->59446 59432->59399 59435 63cb5ca 59434->59435 59437 63cb51e 59434->59437 59436 63cb5cc 59435->59436 59439 63cb5fc CreateWindowExW 59435->59439 59438 63c8714 CreateWindowExW 59436->59438 59437->59399 59440 63cb5f5 59438->59440 59442 63cb734 59439->59442 59440->59399 59444 63cb5f5 59443->59444 59445 63c8714 CreateWindowExW 59443->59445 59444->59399 59445->59444 59447 63cb610 CreateWindowExW 59446->59447 59449 63cb734 59447->59449 59449->59449 59135 dce3f0 59136 dce408 59135->59136 59137 dce462 59136->59137 59143 63c873c 59136->59143 59151 63cb8f9 59136->59151 59155 63cb7c8 59136->59155 59161 63cb7b8 59136->59161 59167 63c872c 59136->59167 59144 63c8747 59143->59144 59145 63ce151 59144->59145 59147 63ce141 59144->59147 59183 63cce94 59145->59183 59171 63ce278 59147->59171 59177 63ce268 59147->59177 59148 63ce14f 59152 63cb900 59151->59152 59246 63c8764 59152->59246 59154 63cb907 59154->59137 59156 63cb7ee 59155->59156 59157 63c872c GetModuleHandleW 59156->59157 59158 63cb7fa 59157->59158 59159 63c873c 2 API calls 59158->59159 59160 63cb80f 59159->59160 59160->59137 59162 63cb7c8 59161->59162 59163 63c872c GetModuleHandleW 59162->59163 59164 63cb7fa 59163->59164 59165 63c873c 2 API calls 59164->59165 59166 63cb80f 59165->59166 59166->59137 59168 63c8737 59167->59168 59169 63c8764 GetModuleHandleW 59168->59169 59170 63cb907 59169->59170 59170->59137 59172 63ce286 59171->59172 59173 63cce94 2 API calls 59172->59173 59174 63ce37b 59172->59174 59190 63ce840 59172->59190 59195 63ce850 59172->59195 59173->59172 59174->59148 59179 63ce26b 59177->59179 59178 63cce94 2 API calls 59178->59179 59179->59178 59180 63ce37b 59179->59180 59181 63ce850 OleGetClipboard 59179->59181 59182 63ce840 OleGetClipboard 59179->59182 59180->59148 59181->59179 59182->59179 59184 63cce9f 59183->59184 59185 63ce49c 59184->59185 59186 63ce3f2 59184->59186 59188 63c873c OleGetClipboard 59185->59188 59187 63ce44a CallWindowProcW 59186->59187 59189 63ce3f9 59186->59189 59187->59189 59188->59189 59189->59148 59191 63ce850 59190->59191 59192 63cea7a 59191->59192 59200 63ceab8 59191->59200 59206 63ceac8 59191->59206 59192->59172 59196 63ce85c 59195->59196 59197 63cea7a 59196->59197 59198 63ceab8 OleGetClipboard 59196->59198 59199 63ceac8 OleGetClipboard 59196->59199 59197->59172 59198->59196 59199->59196 59201 63ceae3 59200->59201 59202 63cead3 59200->59202 59201->59191 59202->59201 59212 63ceb10 59202->59212 59223 63ceb00 59202->59223 59203 63ceaf9 59203->59191 59207 63cead0 59206->59207 59208 63ceae3 59207->59208 59210 63ceb10 OleGetClipboard 59207->59210 59211 63ceb00 OleGetClipboard 59207->59211 59208->59191 59209 63ceaf9 59209->59191 59210->59209 59211->59209 59213 63ceb22 59212->59213 59214 63ceb3d 59213->59214 59216 63ceb81 59213->59216 59219 63ceb10 OleGetClipboard 59214->59219 59220 63ceb00 OleGetClipboard 59214->59220 59215 63ceb43 59215->59203 59218 63cec01 59216->59218 59234 63cf1d8 59216->59234 59238 63cf1c8 59216->59238 59217 63cec1f 59217->59203 59218->59203 59219->59215 59220->59215 59224 63ceb22 59223->59224 59225 63ceb3d 59224->59225 59227 63ceb81 59224->59227 59230 63ceb10 OleGetClipboard 59225->59230 59231 63ceb00 OleGetClipboard 59225->59231 59226 63ceb43 59226->59203 59229 63cec01 59227->59229 59232 63cf1d8 OleGetClipboard 59227->59232 59233 63cf1c8 OleGetClipboard 59227->59233 59228 63cec1f 59228->59203 59229->59203 59230->59226 59231->59226 59232->59228 59233->59228 59236 63cf1ed 59234->59236 59237 63cf213 59236->59237 59242 63ce02c 59236->59242 59237->59217 59240 63cf1ed 59238->59240 59239 63ce02c OleGetClipboard 59239->59240 59240->59239 59241 63cf213 59240->59241 59241->59217 59243 63cf280 OleGetClipboard 59242->59243 59245 63cf31a 59243->59245 59247 63c876f 59246->59247 59252 63c862c 59247->59252 59251 63cb99b 59253 63c8637 59252->59253 59254 63ca0eb 59253->59254 59261 63ca2f0 59253->59261 59271 63ca2e0 59253->59271 59254->59251 59257 63c863c 59254->59257 59258 63ca630 GetModuleHandleW 59257->59258 59260 63ca6a5 59258->59260 59260->59251 59262 63ca305 59261->59262 59263 63c863c GetModuleHandleW 59262->59263 59264 63ca329 59262->59264 59263->59264 59265 63c863c GetModuleHandleW 59264->59265 59270 63ca4f4 59264->59270 59266 63ca47a 59265->59266 59267 63c863c GetModuleHandleW 59266->59267 59266->59270 59268 63ca4c8 59267->59268 59269 63c863c GetModuleHandleW 59268->59269 59268->59270 59269->59270 59270->59254 59272 63ca305 59271->59272 59273 63c863c GetModuleHandleW 59272->59273 59274 63ca329 59272->59274 59273->59274 59275 63c863c GetModuleHandleW 59274->59275 59280 63ca4f4 59274->59280 59276 63ca47a 59275->59276 59277 63c863c GetModuleHandleW 59276->59277 59276->59280 59278 63ca4c8 59277->59278 59279 63c863c GetModuleHandleW 59278->59279 59278->59280 59279->59280 59280->59254 59337 63c1080 59339 63c109b 59337->59339 59338 63c12b5 59339->59338 59340 63c1cf0 RegQueryValueExW 59339->59340 59341 63c1d50 RegQueryValueExW 59339->59341 59344 63c1698 59339->59344 59348 63c1639 59339->59348 59340->59339 59341->59339 59345 63c16ea RegOpenKeyExW 59344->59345 59347 63c175e 59345->59347 59347->59347 59349 63c167c RegOpenKeyExW 59348->59349 59350 63c1659 59348->59350 59352 63c175e 59349->59352 59350->59339 59370 63c5060 59373 63c5085 59370->59373 59371 63c51ff 59372 63c57e4 LdrInitializeThunk 59372->59373 59373->59371 59373->59372 59374 63ce760 59375 63ce770 59374->59375 59378 63cdd6c 59375->59378 59379 63ce7a8 KiUserCallbackDispatcher 59378->59379 59381 63ce777 59379->59381 59450 63ccec0 59451 63ccf26 59450->59451 59455 63cd070 59451->59455 59459 63cd080 59451->59459 59452 63ccfd5 59456 63cd075 59455->59456 59463 63cca6c 59456->59463 59460 63cd097 59459->59460 59461 63cca6c DuplicateHandle 59460->59461 59462 63cd0ae 59461->59462 59462->59452 59464 63cd0e8 DuplicateHandle 59463->59464 59465 63cd0ae 59464->59465 59465->59452 59353 61dc4a0 59355 61dc4bd 59353->59355 59354 61dc898 59355->59354 59356 61dc9ab LdrInitializeThunk 59355->59356 59357 61dc9c8 59356->59357
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: D0ul$D0ul$Xcul$Xcul
                                                                              • API String ID: 0-3458015263
                                                                              • Opcode ID: d74f3ce3bd05a1d82d5259156df7997710d9b223ac4ecac8ede3504bff308103
                                                                              • Instruction ID: ae064ea180aa1b2144065e7b8f2c2391ca38a46759c298925fe9fc6d297b1cc5
                                                                              • Opcode Fuzzy Hash: d74f3ce3bd05a1d82d5259156df7997710d9b223ac4ecac8ede3504bff308103
                                                                              • Instruction Fuzzy Hash: 48921574F042259FCB55DB78C854BAEBBB2AF89354F16846AE506DB3C1CB30DC4287A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 8^ul$xpl
                                                                              • API String ID: 0-4129831687
                                                                              • Opcode ID: 2a000f925905428d2d1d8e6e6bfa70399c3da1ded39ef80ea711ef6eed79d0e9
                                                                              • Instruction ID: 2fc8364c95984938f2c2068702fc99c464cbbfa8a01fa5f71a5d6f4cc9d14232
                                                                              • Opcode Fuzzy Hash: 2a000f925905428d2d1d8e6e6bfa70399c3da1ded39ef80ea711ef6eed79d0e9
                                                                              • Instruction Fuzzy Hash: EEB2D370F442188FEB65DB68C5947AEBBA2EF89304F14806AE446DF392DB35DC81CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: D!ql
                                                                              • API String ID: 0-2124241253
                                                                              • Opcode ID: 9795f1ea9b3d74ae97740076dce7fb45d00cf683e7236e40160e568b7b74ed03
                                                                              • Instruction ID: 2b031ed0f04fd1a91c379962eb83aea4bb4a3fd9d8234d2347395a7447882e4c
                                                                              • Opcode Fuzzy Hash: 9795f1ea9b3d74ae97740076dce7fb45d00cf683e7236e40160e568b7b74ed03
                                                                              • Instruction Fuzzy Hash: 77232B71D106198FCB54EF68C884A9DF7B1FF89300F11C69AE459AB261EB30AAC5CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: edc51d8de12a0361036e47b5367045a703c8da6255f98248b0e62646dda31ff0
                                                                              • Instruction ID: ba5fc609ce03678fa91fde7022da14d3c0ad4c0e45b08d4532ca5370f7a553ea
                                                                              • Opcode Fuzzy Hash: edc51d8de12a0361036e47b5367045a703c8da6255f98248b0e62646dda31ff0
                                                                              • Instruction Fuzzy Hash: 0E53F930D10B598ECB51EF68C884A99F7B1FF99300F15D69AE45877221EB70AAC5CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2098 63c5060-63c50a0 2302 63c50a3 call 63c5bf8 2098->2302 2303 63c50a3 call 63c5be7 2098->2303 2101 63c50a9-63c5166 2115 63c51bd-63c51c7 2101->2115 2116 63c5168-63c51a9 2101->2116 2119 63c51cd-63c51fd call 63c188c 2115->2119 2116->2115 2121 63c51ab-63c51bb 2116->2121 2127 63c520d-63c55ba 2119->2127 2128 63c51ff-63c5208 2119->2128 2121->2119 2167 63c5ba5-63c5bc8 2127->2167 2168 63c55c0-63c55cd 2127->2168 2129 63c5bd8-63c5be5 2128->2129 2169 63c5bcd-63c5bd7 2167->2169 2168->2169 2170 63c55d3-63c563e 2168->2170 2169->2129 2170->2167 2181 63c5644-63c5679 2170->2181 2184 63c567b-63c56a0 2181->2184 2185 63c56a2-63c56aa 2181->2185 2188 63c56ad-63c56f6 call 63c1898 2184->2188 2185->2188 2194 63c5b8c-63c5b92 2188->2194 2195 63c56fc-63c5754 call 63c18a4 2188->2195 2194->2167 2196 63c5b94-63c5b9d 2194->2196 2195->2194 2203 63c575a-63c5764 2195->2203 2196->2170 2197 63c5ba3 2196->2197 2197->2169 2203->2194 2204 63c576a-63c577d 2203->2204 2204->2194 2205 63c5783-63c57aa 2204->2205 2209 63c5b4d-63c5b70 2205->2209 2210 63c57b0-63c57b3 2205->2210 2218 63c5b75-63c5b7b 2209->2218 2210->2209 2211 63c57b9-63c57f3 LdrInitializeThunk 2210->2211 2221 63c57f9-63c5848 2211->2221 2218->2167 2219 63c5b7d-63c5b86 2218->2219 2219->2194 2219->2205 2229 63c598d-63c5993 2221->2229 2230 63c584e-63c5887 2221->2230 2231 63c5995-63c5997 2229->2231 2232 63c59a1 2229->2232 2234 63c59a9-63c59af 2230->2234 2247 63c588d-63c58c3 2230->2247 2231->2232 2232->2234 2236 63c59bd-63c59c0 2234->2236 2237 63c59b1-63c59b3 2234->2237 2239 63c59cb-63c59d1 2236->2239 2237->2236 2240 63c59df-63c59e2 2239->2240 2241 63c59d3-63c59d5 2239->2241 2243 63c5931-63c5961 call 63c18b0 2240->2243 2241->2240 2249 63c5963-63c5982 2243->2249 2253 63c58c9-63c58ec 2247->2253 2254 63c59e7-63c5a15 call 63c18bc 2247->2254 2256 63c5988 2249->2256 2257 63c5a1a-63c5a6c 2249->2257 2253->2254 2264 63c58f2-63c5925 2253->2264 2254->2249 2256->2218 2277 63c5a6e-63c5a74 2257->2277 2278 63c5a76-63c5a7c 2257->2278 2264->2239 2276 63c592b 2264->2276 2276->2243 2279 63c5a8d-63c5aab 2277->2279 2280 63c5a7e-63c5a80 2278->2280 2281 63c5a8a 2278->2281 2285 63c5aad-63c5abd 2279->2285 2286 63c5acf-63c5b4b 2279->2286 2280->2281 2281->2279 2285->2286 2289 63c5abf-63c5ac8 2285->2289 2286->2218 2289->2286 2302->2101 2303->2101
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: f90ed11df796659031f13cbd2e632e4a6d3609d0730c32ff7cf170457a8f9646
                                                                              • Instruction ID: 5648b6d9ba6882ea46aa86124ac30fb9194cf598906931f0c5da259d5097ddf4
                                                                              • Opcode Fuzzy Hash: f90ed11df796659031f13cbd2e632e4a6d3609d0730c32ff7cf170457a8f9646
                                                                              • Instruction Fuzzy Hash: F8624A75E006188FCB64EF78C95469DB7F1AF89310F1089A9D54AAB750EF30AE85CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \pl
                                                                              • API String ID: 0-2208718379
                                                                              • Opcode ID: aafbc410e8cbf5589dcd7a48a614f82e1c7db96ee36aec623c68e9f819ff9b6c
                                                                              • Instruction ID: 0c728637217a8e6d49b08373b253a8d24baa79b084c5a99c08b71ba0c6b88698
                                                                              • Opcode Fuzzy Hash: aafbc410e8cbf5589dcd7a48a614f82e1c7db96ee36aec623c68e9f819ff9b6c
                                                                              • Instruction Fuzzy Hash: F752C271F042148FDB65DBA8C985BAEBBB2EF89310F14842AE115DB791DB30DC85CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2759 61dc4a0-61dc4bb 2760 61dc4bd-61dc4c0 2759->2760 2761 61dc4c7-61dc4ca 2760->2761 2762 61dc4c2 2760->2762 2763 61dc4cc-61dc4d5 2761->2763 2764 61dc4da-61dc4dd 2761->2764 2762->2761 2763->2764 2765 61dc4df-61dc4e2 2764->2765 2766 61dc4f4-61dc4f7 2764->2766 2767 61dc8a8-61dc8cc 2765->2767 2768 61dc4e8-61dc4ef 2765->2768 2769 61dc50d-61dc510 2766->2769 2770 61dc4f9-61dc502 2766->2770 2780 61dc8ce-61dc8d8 2767->2780 2781 61dc8f1-61dc917 2767->2781 2768->2766 2773 61dc527-61dc52a 2769->2773 2774 61dc512-61dc516 2769->2774 2771 61dc508 2770->2771 2772 61dc7d7-61dc7e0 2770->2772 2771->2769 2772->2767 2776 61dc7e6-61dc7ed 2772->2776 2778 61dc52c-61dc530 2773->2778 2779 61dc55b-61dc55e 2773->2779 2774->2767 2777 61dc51c-61dc522 2774->2777 2782 61dc7f2-61dc7f5 2776->2782 2777->2773 2778->2767 2785 61dc536-61dc550 2778->2785 2783 61dc560-61dc56e 2779->2783 2784 61dc573-61dc576 2779->2784 2786 61dc8ed-61dc8f0 2780->2786 2787 61dc8da-61dc8eb 2780->2787 2801 61dc93c-61dc950 2781->2801 2802 61dc919-61dc923 2781->2802 2788 61dc7f7-61dc7fd 2782->2788 2789 61dc802-61dc805 2782->2789 2783->2784 2790 61dc58d-61dc590 2784->2790 2791 61dc578-61dc57c 2784->2791 2819 61dc556 2785->2819 2820 61dc710-61dc714 2785->2820 2787->2786 2788->2789 2794 61dc817-61dc81a 2789->2794 2795 61dc807 2789->2795 2798 61dc5a4-61dc5a7 2790->2798 2799 61dc592-61dc599 2790->2799 2791->2767 2797 61dc582-61dc588 2791->2797 2803 61dc81c-61dc825 2794->2803 2804 61dc82a-61dc82d 2794->2804 2812 61dc80f-61dc812 2795->2812 2797->2790 2807 61dc5a9-61dc5ac 2798->2807 2808 61dc5b1-61dc5b4 2798->2808 2805 61dc59f 2799->2805 2806 61dc75b-61dc764 2799->2806 2826 61dc98e-61dc9c2 LdrInitializeThunk 2801->2826 2827 61dc952-61dc987 call 61daca8 call 61dadc0 2801->2827 2813 61dc938-61dc93b 2802->2813 2814 61dc925-61dc936 2802->2814 2803->2804 2815 61dc82f-61dc842 2804->2815 2816 61dc847-61dc84a 2804->2816 2805->2798 2828 61dc769-61dc76c 2806->2828 2807->2808 2809 61dc5c9-61dc5cc 2808->2809 2810 61dc5b6-61dc5c4 2808->2810 2823 61dc5ce-61dc5f1 2809->2823 2824 61dc5f6-61dc5f9 2809->2824 2810->2809 2812->2794 2814->2813 2815->2816 2821 61dc84c-61dc850 2816->2821 2822 61dc877-61dc87a 2816->2822 2819->2779 2820->2767 2830 61dc71a-61dc734 2820->2830 2821->2767 2831 61dc852-61dc86c 2821->2831 2832 61dc87c-61dc87f 2822->2832 2833 61dc886-61dc888 2822->2833 2823->2824 2835 61dc60e-61dc611 2824->2835 2836 61dc5fb-61dc609 2824->2836 2890 61dc9c8-61dc9e2 2826->2890 2891 61dcb0b-61dcb28 2826->2891 2827->2826 2839 61dc77c-61dc77f 2828->2839 2840 61dc76e-61dc777 2828->2840 2830->2821 2872 61dc73a 2830->2872 2838 61dc781-61dc785 2831->2838 2879 61dc872 2831->2879 2842 61dc881 2832->2842 2843 61dc8a3 2832->2843 2844 61dc88f-61dc892 2833->2844 2845 61dc88a 2833->2845 2837 61dc617-61dc61a 2835->2837 2835->2838 2836->2835 2848 61dc61c-61dc631 2837->2848 2849 61dc658-61dc65b 2837->2849 2838->2843 2854 61dc78b 2838->2854 2839->2838 2853 61dc790-61dc793 2839->2853 2840->2839 2842->2833 2843->2767 2844->2760 2847 61dc898-61dc8a2 2844->2847 2845->2844 2848->2767 2871 61dc637-61dc653 2848->2871 2857 61dc65d-61dc672 2849->2857 2858 61dc69a-61dc69d 2849->2858 2860 61dc795-61dc7b1 2853->2860 2861 61dc7b6-61dc7b9 2853->2861 2854->2853 2857->2767 2885 61dc678-61dc695 2857->2885 2865 61dc6ad-61dc6b0 2858->2865 2866 61dc69f-61dc6a2 2858->2866 2860->2861 2861->2838 2869 61dc7bb-61dc7be 2861->2869 2875 61dc6c3-61dc6c6 2865->2875 2876 61dc6b2-61dc6be 2865->2876 2866->2765 2874 61dc6a8 2866->2874 2881 61dc7c0-61dc7cd 2869->2881 2882 61dc7d2-61dc7d5 2869->2882 2871->2849 2884 61dc73f-61dc742 2872->2884 2874->2865 2887 61dc6dd-61dc6e0 2875->2887 2888 61dc6c8-61dc6cc 2875->2888 2876->2875 2879->2822 2881->2882 2882->2772 2882->2782 2884->2770 2893 61dc748-61dc74b 2884->2893 2885->2858 2896 61dc6e7-61dc6ea 2887->2896 2897 61dc6e2-61dc6e4 2887->2897 2888->2767 2895 61dc6d2-61dc6d8 2888->2895 2890->2891 2910 61dc9e8-61dca02 2890->2910 2919 61dcb2d-61dcb36 2891->2919 2893->2838 2900 61dc74d-61dc750 2893->2900 2895->2887 2902 61dc6ec-61dc6f9 2896->2902 2903 61dc6fe-61dc701 2896->2903 2897->2896 2900->2866 2907 61dc756-61dc759 2900->2907 2902->2903 2904 61dc70b-61dc70e 2903->2904 2905 61dc703-61dc708 2903->2905 2904->2820 2904->2884 2905->2904 2907->2806 2907->2828 2913 61dca08 2910->2913 2914 61dca04-61dca06 2910->2914 2916 61dca0b-61dca66 call 61dbc24 2913->2916 2914->2916 2926 61dca6c 2916->2926 2927 61dca68-61dca6a 2916->2927 2928 61dca6f-61dcb09 call 61dbc24 2926->2928 2927->2928 2928->2919
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.706969907.00000000061D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 061D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_61d0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: bf63f8d06ac8ffda09d5d9d8c9589a1e5d03199b704a127b76e6029e9c6d2cca
                                                                              • Instruction ID: ce62aa4eb5d2c72b6bad19f557adda5ad979dec90e96dd9e174770661103d2c6
                                                                              • Opcode Fuzzy Hash: bf63f8d06ac8ffda09d5d9d8c9589a1e5d03199b704a127b76e6029e9c6d2cca
                                                                              • Instruction Fuzzy Hash: C412B274E102059FDF60DBA8C494BAEBBB6EF85304F148D6AE445DB381DB34D845CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 8^ul
                                                                              • API String ID: 0-1689627688
                                                                              • Opcode ID: 9162a43bbbfa10698fa35d63516064aa7ecbecd7333c78ec70de2c355f9f3db5
                                                                              • Instruction ID: 5e9e1fbac078df7e0bd5b358149ef69a812d16834df0a4e270d0293f15344a34
                                                                              • Opcode Fuzzy Hash: 9162a43bbbfa10698fa35d63516064aa7ecbecd7333c78ec70de2c355f9f3db5
                                                                              • Instruction Fuzzy Hash: 0432F670E042188FDB65DBA8C59479EB7E2EF89300F14C06AD44AAF396DB35DC85CB61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7fb6aba78a9cd9e92e610d31ac6d9aea983a414ba9b8358745ed0b504287a7aa
                                                                              • Instruction ID: 4db0f53bd084714a67f03d3edcd04aa4741c31db401c9c4a055cc0b7a1e19f3b
                                                                              • Opcode Fuzzy Hash: 7fb6aba78a9cd9e92e610d31ac6d9aea983a414ba9b8358745ed0b504287a7aa
                                                                              • Instruction Fuzzy Hash: D1D10831F041A44BDB578F69C8843AEBBB1EF89320F18856BD456DB791C632D885CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1008 63cb559-63cb560 1009 63cb5ca 1008->1009 1010 63cb562-63cb564 1008->1010 1011 63cb5fc-63cb676 1009->1011 1012 63cb5cc-63cb5f0 call 63c8714 1009->1012 1013 63cb51e-63cb524 1010->1013 1014 63cb566-63cb58d 1010->1014 1016 63cb678-63cb67e 1011->1016 1017 63cb681-63cb688 1011->1017 1018 63cb5f5-63cb5f6 1012->1018 1016->1017 1019 63cb68a-63cb690 1017->1019 1020 63cb693-63cb732 CreateWindowExW 1017->1020 1019->1020 1023 63cb73b-63cb773 1020->1023 1024 63cb734-63cb73a 1020->1024 1028 63cb775-63cb778 1023->1028 1029 63cb780 1023->1029 1024->1023 1028->1029 1030 63cb781 1029->1030 1030->1030
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: W
                                                                              • API String ID: 0-655174618
                                                                              • Opcode ID: 58117a11ef0d888d79d0755ecb75a0189e3fcb85742f3a21b2aa0a2683cfda02
                                                                              • Instruction ID: 310b957f02a461417d9e56132a2c32bbc875f054ad32c4c5ccae13a689901efc
                                                                              • Opcode Fuzzy Hash: 58117a11ef0d888d79d0755ecb75a0189e3fcb85742f3a21b2aa0a2683cfda02
                                                                              • Instruction Fuzzy Hash: 3C6123B2D002499FDF05CFA9D884ADDBFB2FF48310F14816AE919AB221C7759955CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2580 63c3017-63c3037 2581 63c305c-63c3087 2580->2581 2582 63c3039-63c3043 2580->2582 2587 63c30ac-63c30d7 2581->2587 2588 63c3089-63c3093 2581->2588 2583 63c3058-63c305b 2582->2583 2584 63c3045-63c3056 2582->2584 2584->2583 2593 63c30fc-63c3127 2587->2593 2594 63c30d9-63c30e3 2587->2594 2589 63c30a8-63c30ab 2588->2589 2590 63c3095-63c30a6 2588->2590 2590->2589 2599 63c314c-63c3177 2593->2599 2600 63c3129-63c3133 2593->2600 2595 63c30f8-63c30fb 2594->2595 2596 63c30e5-63c30f6 2594->2596 2596->2595 2605 63c319c-63c31c0 2599->2605 2606 63c3179-63c3183 2599->2606 2601 63c3148-63c314b 2600->2601 2602 63c3135-63c3146 2600->2602 2602->2601 2611 63c31c1 2605->2611 2607 63c3198-63c319b 2606->2607 2608 63c3185-63c3196 2606->2608 2608->2607 2612 63c31c7 2611->2612 2613 63c31c3 2611->2613 2615 63c31ec-63c3204 2612->2615 2616 63c31c9-63c31d3 2612->2616 2613->2612 2614 63c31c5 2613->2614 2614->2612 2615->2611 2621 63c3206-63c3217 2615->2621 2617 63c31e8-63c31eb 2616->2617 2618 63c31d5-63c31e6 2616->2618 2618->2617 2622 63c323c-63c3267 2621->2622 2623 63c3219-63c3223 2621->2623 2627 63c328c-63c3298 2622->2627 2628 63c3269-63c3273 2622->2628 2624 63c3238-63c323b 2623->2624 2625 63c3225-63c3236 2623->2625 2625->2624 2634 63c329a-63c32a0 2627->2634 2635 63c32a2-63c32b7 2627->2635 2630 63c3288-63c328b 2628->2630 2631 63c3275-63c3286 2628->2631 2631->2630 2634->2635 2636 63c32dc-63c32f0 2635->2636 2637 63c32b9-63c32c3 2635->2637 2642 63c32fa-63c3307 2636->2642 2643 63c32f2-63c32f5 2636->2643 2638 63c32d8-63c32db 2637->2638 2639 63c32c5-63c32d6 2637->2639 2639->2638 2644 63c332c-63c3357 2642->2644 2645 63c3309-63c3313 2642->2645 2643->2642 2649 63c337c-63c33a7 2644->2649 2650 63c3359-63c3363 2644->2650 2646 63c3328-63c332b 2645->2646 2647 63c3315-63c3326 2645->2647 2647->2646 2656 63c33cc-63c33f7 2649->2656 2657 63c33a9-63c33b3 2649->2657 2652 63c3378-63c337b 2650->2652 2653 63c3365-63c3376 2650->2653 2653->2652 2661 63c341c-63c3447 2656->2661 2662 63c33f9-63c3403 2656->2662 2658 63c33c8-63c33cb 2657->2658 2659 63c33b5-63c33c6 2657->2659 2659->2658 2668 63c346c-63c3497 2661->2668 2669 63c3449-63c3453 2661->2669 2664 63c3418-63c341b 2662->2664 2665 63c3405-63c3416 2662->2665 2665->2664 2675 63c34bc-63c34e7 2668->2675 2676 63c3499-63c34a3 2668->2676 2670 63c3468-63c346b 2669->2670 2671 63c3455-63c3466 2669->2671 2671->2670 2681 63c350c-63c3537 2675->2681 2682 63c34e9-63c34f3 2675->2682 2677 63c34b8-63c34bb 2676->2677 2678 63c34a5-63c34b6 2676->2678 2678->2677 2686 63c355c-63c35a6 2681->2686 2687 63c3539-63c3543 2681->2687 2683 63c3508-63c350b 2682->2683 2684 63c34f5-63c3506 2682->2684 2684->2683 2695 63c35af-63c35c4 LdrInitializeThunk 2686->2695 2689 63c3558-63c355b 2687->2689 2690 63c3545-63c3556 2687->2690 2690->2689 2696 63c35cb-63c35d7 2695->2696 2697 63c35dd-63c35e6 2696->2697 2698 63c37d7-63c37ea 2696->2698 2700 63c380c 2697->2700 2701 63c35ec-63c3601 2697->2701 2699 63c3811-63c3815 2698->2699 2702 63c3817 2699->2702 2703 63c3820 2699->2703 2700->2699 2706 63c361b-63c3636 2701->2706 2707 63c3603-63c3616 2701->2707 2702->2703 2705 63c3821 2703->2705 2705->2705 2717 63c3638-63c3642 2706->2717 2718 63c3644 2706->2718 2708 63c37ab-63c37af 2707->2708 2709 63c37ba-63c37c3 2708->2709 2710 63c37b1 2708->2710 2714 63c37c5-63c37d1 2709->2714 2715 63c3807 2709->2715 2710->2709 2714->2697 2714->2698 2715->2700 2719 63c3649-63c364b 2717->2719 2718->2719 2720 63c364d-63c3660 2719->2720 2721 63c3665-63c36fd call 63c2fa0 2719->2721 2720->2708 2740 63c36ff-63c3709 2721->2740 2741 63c370b 2721->2741 2742 63c3710-63c3712 2740->2742 2741->2742 2743 63c3714-63c3716 2742->2743 2744 63c3755-63c37a9 2742->2744 2745 63c3718-63c3722 2743->2745 2746 63c3724 2743->2746 2744->2708 2748 63c3729-63c372b 2745->2748 2746->2748 2748->2744 2749 63c372d-63c3753 2748->2749 2749->2744
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: d1cfaaa0f258901121b033fec33fed2f73b2ec1e798f5e62af4e2888b1adaa94
                                                                              • Instruction ID: 4edef0d302edd9ca8b8a524a7acbfdd11d3ec46bce2897846e2464410fff5092
                                                                              • Opcode Fuzzy Hash: d1cfaaa0f258901121b033fec33fed2f73b2ec1e798f5e62af4e2888b1adaa94
                                                                              • Instruction Fuzzy Hash: F8126135B5E3819FE787977888286553FB29F47214F1AC4E6D148CF2A3DA25CC0E8762
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3459 63c3578-63c35c4 LdrInitializeThunk 3463 63c35cb-63c35d7 3459->3463 3464 63c35dd-63c35e6 3463->3464 3465 63c37d7-63c37ea 3463->3465 3467 63c380c 3464->3467 3468 63c35ec-63c3601 3464->3468 3466 63c3811-63c3815 3465->3466 3469 63c3817 3466->3469 3470 63c3820 3466->3470 3467->3466 3473 63c361b-63c3636 3468->3473 3474 63c3603-63c3616 3468->3474 3469->3470 3472 63c3821 3470->3472 3472->3472 3484 63c3638-63c3642 3473->3484 3485 63c3644 3473->3485 3475 63c37ab-63c37af 3474->3475 3476 63c37ba-63c37c3 3475->3476 3477 63c37b1 3475->3477 3481 63c37c5-63c37d1 3476->3481 3482 63c3807 3476->3482 3477->3476 3481->3464 3481->3465 3482->3467 3486 63c3649-63c364b 3484->3486 3485->3486 3487 63c364d-63c3660 3486->3487 3488 63c3665-63c36fd call 63c2fa0 3486->3488 3487->3475 3507 63c36ff-63c3709 3488->3507 3508 63c370b 3488->3508 3509 63c3710-63c3712 3507->3509 3508->3509 3510 63c3714-63c3716 3509->3510 3511 63c3755-63c37a9 3509->3511 3512 63c3718-63c3722 3510->3512 3513 63c3724 3510->3513 3511->3475 3515 63c3729-63c372b 3512->3515 3513->3515 3515->3511 3516 63c372d-63c3753 3515->3516 3516->3511
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: InitializeThunk
                                                                              • String ID:
                                                                              • API String ID: 2994545307-0
                                                                              • Opcode ID: e8483a0404b6b8e3512088f5f61f8eb30dbbae160b124870ee9d23e7501e0ebb
                                                                              • Instruction ID: 92b2ed180fc6cb9317d91e259fd7529f08f10136cd861baccd91dce7740048fa
                                                                              • Opcode Fuzzy Hash: e8483a0404b6b8e3512088f5f61f8eb30dbbae160b124870ee9d23e7501e0ebb
                                                                              • Instruction Fuzzy Hash: 05612B75E11219DFEB54EBB4D858BAEBBB6AF84314F108828E402E7390DF359D45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3526 63c8830-63c883b 3527 63c883d-63c8864 call 63c8420 3526->3527 3528 63c8865-63c8868 3526->3528 3530 63c8869-63c8884 call 63c842c 3528->3530 3535 63c888a-63c88d4 3530->3535 3536 63c8886-63c8889 3530->3536 3535->3530 3541 63c88d6-63c88e9 3535->3541 3543 63c88ef-63c897c GlobalMemoryStatusEx 3541->3543 3544 63c88eb-63c88ee 3541->3544 3547 63c897e-63c8984 3543->3547 3548 63c8985-63c89ad 3543->3548 3547->3548
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 082f19842ba6294adbd14afae79ba55a442fb3c3c178857bacae8c8a2ca14871
                                                                              • Instruction ID: 49a6f2c3fbc454afbe8be435a7bd64c9ad0d603fb8a0f419fcd571d1a4707c7b
                                                                              • Opcode Fuzzy Hash: 082f19842ba6294adbd14afae79ba55a442fb3c3c178857bacae8c8a2ca14871
                                                                              • Instruction Fuzzy Hash: 96412572E043598FCB04DF79C8446DEFBB1EF89220F08856AE514A7680DB349949CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3551 63c1cf0-63c1d0f 3552 63c1d34-63c1db9 3551->3552 3553 63c1d11-63c1d1b 3551->3553 3559 63c1dbb-63c1dbe 3552->3559 3560 63c1dc1-63c1dcb 3552->3560 3554 63c1d1d-63c1d2e 3553->3554 3555 63c1d30-63c1d33 3553->3555 3554->3555 3559->3560 3561 63c1dcd-63c1dd5 3560->3561 3562 63c1dd7-63c1e19 RegQueryValueExW 3560->3562 3561->3562 3563 63c1e1b-63c1e21 3562->3563 3564 63c1e22-63c1e5c 3562->3564 3563->3564 3568 63c1e5e 3564->3568 3569 63c1e66 3564->3569 3568->3569 3570 63c1e67 3569->3570 3570->3570
                                                                              APIs
                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 063C1E09
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: QueryValue
                                                                              • String ID:
                                                                              • API String ID: 3660427363-0
                                                                              • Opcode ID: baa32e37ec20b028273e830cbae7bce7f4390a5bc88568b5eb701bf83869c06b
                                                                              • Instruction ID: ca12e4174d4ae3545555de6e38e3c299571f3f9f1814d2025b3a7a931b31f6cd
                                                                              • Opcode Fuzzy Hash: baa32e37ec20b028273e830cbae7bce7f4390a5bc88568b5eb701bf83869c06b
                                                                              • Instruction Fuzzy Hash: E94126B1D04298DFCB11CFA9C894ADEBFF5AF49310F54846AE858AB341D774990ACF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3571 63c1639-63c1657 3572 63c167c-63c16e8 3571->3572 3573 63c1659-63c1663 3571->3573 3578 63c16ea-63c16ed 3572->3578 3579 63c16f0-63c175c RegOpenKeyExW 3572->3579 3574 63c1678-63c167b 3573->3574 3575 63c1665-63c1676 3573->3575 3575->3574 3578->3579 3581 63c175e-63c1764 3579->3581 3582 63c1765-63c179d 3579->3582 3581->3582 3586 63c179f-63c17a8 3582->3586 3587 63c17b0 3582->3587 3586->3587 3588 63c17b1 3587->3588 3588->3588
                                                                              APIs
                                                                              • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 063C174C
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Open
                                                                              • String ID:
                                                                              • API String ID: 71445658-0
                                                                              • Opcode ID: 9ca25cfb3f5dad8d6d123598c9b7fe6c429e78190a574c0d4d222068d143974c
                                                                              • Instruction ID: 4ecdd086cbf4d87b0cf237d705f05ce5b05f82f8b911628dfbd39db24a26d9d7
                                                                              • Opcode Fuzzy Hash: 9ca25cfb3f5dad8d6d123598c9b7fe6c429e78190a574c0d4d222068d143974c
                                                                              • Instruction Fuzzy Hash: 7B416BB1D052498FDB00CFA8C54469EFFF5AF49314F19C56AE448AB342C7749849CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3589 63c8714-63cb676 3591 63cb678-63cb67e 3589->3591 3592 63cb681-63cb688 3589->3592 3591->3592 3593 63cb68a-63cb690 3592->3593 3594 63cb693-63cb732 CreateWindowExW 3592->3594 3593->3594 3596 63cb73b-63cb773 3594->3596 3597 63cb734-63cb73a 3594->3597 3601 63cb775-63cb778 3596->3601 3602 63cb780 3596->3602 3597->3596 3601->3602 3603 63cb781 3602->3603 3603->3603
                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 063CB722
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CreateWindow
                                                                              • String ID:
                                                                              • API String ID: 716092398-0
                                                                              • Opcode ID: 79e235ee38e9f191f5060d1850505ac57d042e78f3368b3ed3531ebf3d95c549
                                                                              • Instruction ID: 414d7bb11b4b0ac797386c3a2729832cd72e641b071f0847085b4cb5f9feeddf
                                                                              • Opcode Fuzzy Hash: 79e235ee38e9f191f5060d1850505ac57d042e78f3368b3ed3531ebf3d95c549
                                                                              • Instruction Fuzzy Hash: 0351BDB1D10309AFDB14CF99C984ADEFBB5BF48310F24812AE919AB210D7759855CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 3795 63cce94-63ce3ec 3798 63ce49c-63ce4bc call 63c873c 3795->3798 3799 63ce3f2-63ce3f7 3795->3799 3806 63ce4bf-63ce4cc 3798->3806 3800 63ce3f9-63ce430 3799->3800 3801 63ce44a-63ce482 CallWindowProcW 3799->3801 3809 63ce439-63ce448 3800->3809 3810 63ce432-63ce438 3800->3810 3803 63ce48b-63ce49a 3801->3803 3804 63ce484-63ce48a 3801->3804 3803->3806 3804->3803 3809->3806 3810->3809
                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 063CE471
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CallProcWindow
                                                                              • String ID:
                                                                              • API String ID: 2714655100-0
                                                                              • Opcode ID: 7cca3bbe9fb0ab782aa8cb4dca9cdf86f5d4143652123c01c36a9a3179d7b242
                                                                              • Instruction ID: ab85e0c7313bdf141ba8df789387dc2ff888626a60e3cd13732336fd7a96a613
                                                                              • Opcode Fuzzy Hash: 7cca3bbe9fb0ab782aa8cb4dca9cdf86f5d4143652123c01c36a9a3179d7b242
                                                                              • Instruction Fuzzy Hash: 434158B5A00205CFDB50CF99C888AAABBF5FF88324F15845DE519AB361D774A841CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 0281C91A
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.679370246.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2810000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 62f7fa0f3eaed975bfb07749068896c71e3fa2f8384aeb733b56421b54edf90e
                                                                              • Instruction ID: bc1e9ea37de2d25860da979566e3d693af6a4fd6552a34ab9028d84177242bb6
                                                                              • Opcode Fuzzy Hash: 62f7fa0f3eaed975bfb07749068896c71e3fa2f8384aeb733b56421b54edf90e
                                                                              • Instruction Fuzzy Hash: 153133B9D402599FDB14CFA8C885BDEBBF5AB08314F14812AE819E7380D7749486CF96
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(?), ref: 0281C91A
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.679370246.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2810000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad
                                                                              • String ID:
                                                                              • API String ID: 1029625771-0
                                                                              • Opcode ID: 7e434125f73bdc0a35198da44d9fc71212ebf04d88a60c034bdd2930ff3319b8
                                                                              • Instruction ID: cd1d2cbd80cfddbd2664d7e9b6c417aabeead27d0f1f33a28329537caf48988a
                                                                              • Opcode Fuzzy Hash: 7e434125f73bdc0a35198da44d9fc71212ebf04d88a60c034bdd2930ff3319b8
                                                                              • Instruction Fuzzy Hash: 5A3148B9D402589FDB14CFA8C4857DEBBB5FB08314F10812AE819E7380D7749446CF96
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 063C1E09
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: QueryValue
                                                                              • String ID:
                                                                              • API String ID: 3660427363-0
                                                                              • Opcode ID: 90c2507a2bf67ef7e9f06b401ad158c25072a2cbb9d8b6c35561cf9559047363
                                                                              • Instruction ID: 52160ab99bc2f0431a80676d875c3ed4009882147d10a123df9c3833f76b764d
                                                                              • Opcode Fuzzy Hash: 90c2507a2bf67ef7e9f06b401ad158c25072a2cbb9d8b6c35561cf9559047363
                                                                              • Instruction Fuzzy Hash: 8E31DDB1D00258DFCB10CFAAC984A9EFBF5BF48724F54802AE819AB750D7749945CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RegOpenKeyExW.KERNELBASE(?,00000000,?,00000001,?), ref: 063C174C
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Open
                                                                              • String ID:
                                                                              • API String ID: 71445658-0
                                                                              • Opcode ID: 11f9a5f9c093b8317f0a2c4f0f2a7e135a5e695d4ab30f146805b906f9ad5b9f
                                                                              • Instruction ID: fe84f5c9bb2f32a6a3aa1e7eb42bb966f7ec26b7036e5c8628fd52ced08cce0b
                                                                              • Opcode Fuzzy Hash: 11f9a5f9c093b8317f0a2c4f0f2a7e135a5e695d4ab30f146805b906f9ad5b9f
                                                                              • Instruction Fuzzy Hash: FD31FFB1D002499FDB10CF99C588A8EFBF5BB48324F28816EE808AB341C7759985CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Clipboard
                                                                              • String ID:
                                                                              • API String ID: 220874293-0
                                                                              • Opcode ID: 926afb4608ce47abbfcf07313bea43c00267aa5166c74bc0afb7aee3c060d2cc
                                                                              • Instruction ID: 89cfa198f155a9a49aeebb623954a1cf02fb59ab21ca092a5d46edd6a6853d67
                                                                              • Opcode Fuzzy Hash: 926afb4608ce47abbfcf07313bea43c00267aa5166c74bc0afb7aee3c060d2cc
                                                                              • Instruction Fuzzy Hash: EE31D3B0D00248EFDB54DF99C984BDEBBF6AF48314F148019E504BB390D7746949CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Clipboard
                                                                              • String ID:
                                                                              • API String ID: 220874293-0
                                                                              • Opcode ID: 04909a3c1f999b47a08a5fb8e3b0de664b834c9744782df9cfc78f2bde2a8332
                                                                              • Instruction ID: 88e00b474a7d740362013a10ba910792b0a15cec77da6b2b829e46a9842e426c
                                                                              • Opcode Fuzzy Hash: 04909a3c1f999b47a08a5fb8e3b0de664b834c9744782df9cfc78f2bde2a8332
                                                                              • Instruction Fuzzy Hash: E931E2B0D00248DFDB50CF99C985BCEBBB6BF48314F14801AE404AB290D7745949CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,063CE777), ref: 063CE807
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CallbackDispatcherUser
                                                                              • String ID:
                                                                              • API String ID: 2492992576-0
                                                                              • Opcode ID: 5348216a009fe336dff665cc354e6832ec18fc9497e3f9a8ee54e934cf4a024c
                                                                              • Instruction ID: daf95638d0e8f82563bbff990419bc888ab993edfdc92b9010a94ab9ea8c6c56
                                                                              • Opcode Fuzzy Hash: 5348216a009fe336dff665cc354e6832ec18fc9497e3f9a8ee54e934cf4a024c
                                                                              • Instruction Fuzzy Hash: AC21A9B28043888FCB00CFA9C849BCEBFF4EF49224F14844AD554AB241C735A949CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,063CD0AE,?,?,?,?,?), ref: 063CD16F
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: 6feed469c4148c98290c69d2c3a2ead42aabdc334cbf4beb88602a92399a17e2
                                                                              • Instruction ID: bc8d7673b80c6a53833b5b6e27c7be315778829dca66740264ead0012f31c3b2
                                                                              • Opcode Fuzzy Hash: 6feed469c4148c98290c69d2c3a2ead42aabdc334cbf4beb88602a92399a17e2
                                                                              • Instruction Fuzzy Hash: 3A21D4B5900258AFDB50CF99D984ADEBBF4EB48324F14801AE914A7350D378A954CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,063CD0AE,?,?,?,?,?), ref: 063CD16F
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: DuplicateHandle
                                                                              • String ID:
                                                                              • API String ID: 3793708945-0
                                                                              • Opcode ID: b001b7d501b4864d925a48376630b538784322e990dca7280f08d80fbe491f27
                                                                              • Instruction ID: a33a48515de3ecafb4cfef7e2fc5199935d834f95257d2b510727bc6fed896e6
                                                                              • Opcode Fuzzy Hash: b001b7d501b4864d925a48376630b538784322e990dca7280f08d80fbe491f27
                                                                              • Instruction Fuzzy Hash: BF21E3B6D002589FDB40CFA9D984ADEBBF4FB48324F14841AE914A3350D378A945CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 02814CBA
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.679370246.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2810000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: EncodePointer
                                                                              • String ID:
                                                                              • API String ID: 2118026453-0
                                                                              • Opcode ID: 03a6a67fc1085fdbfda56beef434c806d8d08777ebe8d2303b8caca4c0544ebf
                                                                              • Instruction ID: 1399e79de1ceb7310f9dd05c6ad160fb10738b0baf664f4a96918c847a1d3fa8
                                                                              • Opcode Fuzzy Hash: 03a6a67fc1085fdbfda56beef434c806d8d08777ebe8d2303b8caca4c0544ebf
                                                                              • Instruction Fuzzy Hash: 9C21BE798013498FEB10CF95D50879ABFF8EB49324F14806AE519E3680D7395544CFB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,063C8882), ref: 063C896F
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: 0307c7577381de15b41c6c58932a967655f2c3f167de24e65baa3f4a1538b458
                                                                              • Instruction ID: 81efb8e29eb7c73bbc632ac3e65bdf445d23b9caf1a8974426a243ff8b26fe88
                                                                              • Opcode Fuzzy Hash: 0307c7577381de15b41c6c58932a967655f2c3f167de24e65baa3f4a1538b458
                                                                              • Instruction Fuzzy Hash: B91117B1C046599BCB10CF9AC4447DEFBF4EB48224F05816AE914B7240D778A954CFE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlEncodePointer.NTDLL(00000000), ref: 02814CBA
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.679370246.0000000002810000.00000040.00000800.00020000.00000000.sdmp, Offset: 02810000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_2810000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: EncodePointer
                                                                              • String ID:
                                                                              • API String ID: 2118026453-0
                                                                              • Opcode ID: ae5001f473bfd650b66293caffc92292bcfc56c6bf1ceaf53e44cedb66f9303d
                                                                              • Instruction ID: be67d0739b7e706ae3a9d8548d21ac9e3d978f5ae4b1eac736f9b444eeaab525
                                                                              • Opcode Fuzzy Hash: ae5001f473bfd650b66293caffc92292bcfc56c6bf1ceaf53e44cedb66f9303d
                                                                              • Instruction Fuzzy Hash: 3B116D759013498FEB50DF99D5087DEBBF8EB49328F208429E509A3680DB796544CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,063C8882), ref: 063C896F
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: GlobalMemoryStatus
                                                                              • String ID:
                                                                              • API String ID: 1890195054-0
                                                                              • Opcode ID: f1110e0fd062a9b5113b4ecde1a1769359d175d7654bf94f90357b298e76375e
                                                                              • Instruction ID: ef7af5d13755c8b4d4e66ae7a5c0446479e3f9d0116dbd595ba07608ffed0fb9
                                                                              • Opcode Fuzzy Hash: f1110e0fd062a9b5113b4ecde1a1769359d175d7654bf94f90357b298e76375e
                                                                              • Instruction Fuzzy Hash: D21114B2C0066A9BCB10CF99C5447DEFBF4AF48224F05816AE958B7240D378AA44CFE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 063CA696
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: d645ea6f4323b84ac4044600686c384cefd485653686402f8a1a368e9ae7b089
                                                                              • Instruction ID: ba750eeed0f765964a118eae8c368120830b442b63c8c6b02f32a42bdc935f77
                                                                              • Opcode Fuzzy Hash: d645ea6f4323b84ac4044600686c384cefd485653686402f8a1a368e9ae7b089
                                                                              • Instruction Fuzzy Hash: C611F0B6D046598FDB10CF9AC448BDEFBF4EB89324F10841AE829B7600D375A945CFA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 063CA696
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: HandleModule
                                                                              • String ID:
                                                                              • API String ID: 4139908857-0
                                                                              • Opcode ID: 06322933359a4e128811d874529be744234fefcd554bf63872adb4f11e2692da
                                                                              • Instruction ID: 21950e1fb399bf564a4b196aa725a4c6bb7918408dc548ce169d201b9b129242
                                                                              • Opcode Fuzzy Hash: 06322933359a4e128811d874529be744234fefcd554bf63872adb4f11e2692da
                                                                              • Instruction Fuzzy Hash: F211F0B6C016598FDB10CF9AC444BDEFBF5AB89324F14851AD429B7600C375A946CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,?,?,063CE777), ref: 063CE807
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CallbackDispatcherUser
                                                                              • String ID:
                                                                              • API String ID: 2492992576-0
                                                                              • Opcode ID: 925f7c0a87591aded6586918eafbfb541489ea5e968df89f569a915e4092ccf5
                                                                              • Instruction ID: 4f3a3a132c6db02a6acfa284a35270d3b4f5eee4005df3d30b0d40e1c8bee5cf
                                                                              • Opcode Fuzzy Hash: 925f7c0a87591aded6586918eafbfb541489ea5e968df89f569a915e4092ccf5
                                                                              • Instruction Fuzzy Hash: D51113B19042088FDB10DF9AC488B9EFBF4EB88324F14841AE519A7240C775A944CFE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • OleInitialize.OLE32(00000000), ref: 063CED8D
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: 775bf3e9de3a83e0269cd17c42e80849d8ed137550c7bde38f3c0a94e27358df
                                                                              • Instruction ID: 4ebbae93195591b0989b0c9644c60fb486b8830a40227b2626c965f803f43323
                                                                              • Opcode Fuzzy Hash: 775bf3e9de3a83e0269cd17c42e80849d8ed137550c7bde38f3c0a94e27358df
                                                                              • Instruction Fuzzy Hash: C91130B18002488FDB20DF99C488BDEBBF8EF88224F10841AE518A3240C378A944CFE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • OleInitialize.OLE32(00000000), ref: 063CED8D
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: ac4a6954efa557e8fcf77e9e5ea42aecb96d2a92dc87aafbc209a90a79aa2f04
                                                                              • Instruction ID: cdf2a3fdf442762532b0cd220df5f3914225a8cb8b323a9cad3b5c1b730c08e1
                                                                              • Opcode Fuzzy Hash: ac4a6954efa557e8fcf77e9e5ea42aecb96d2a92dc87aafbc209a90a79aa2f04
                                                                              • Instruction Fuzzy Hash: 671112B1D00259CFDB60DF99D588BDEFBF4EB88324F14845AE519A7600C378A984CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • OleInitialize.OLE32(00000000), ref: 063CED8D
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707230743.00000000063C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063C0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_63c0000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Initialize
                                                                              • String ID:
                                                                              • API String ID: 2538663250-0
                                                                              • Opcode ID: d3a1845dbed3088ddc3ff2eae1eac4be681f624f5e1a588599be53501701c11b
                                                                              • Instruction ID: bc36af40f15a059d9d709cf71527657015b206bf0de2e8083bbb0dbec063b7e9
                                                                              • Opcode Fuzzy Hash: d3a1845dbed3088ddc3ff2eae1eac4be681f624f5e1a588599be53501701c11b
                                                                              • Instruction Fuzzy Hash: 3EF059729083808FDB619BADD8483D9BFE0EF82264F18808FD145E7161C3788949C7D1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Xcul
                                                                              • API String ID: 0-1931488744
                                                                              • Opcode ID: 6b51b24ad2b27fa523a92fdd5a82fe4f1e564a7bfd375ecf519d390e1aecd97e
                                                                              • Instruction ID: e68f132a60ccdb6b158c4aed8f36f915ecffcf6d82345b6b7139c573bbf268da
                                                                              • Opcode Fuzzy Hash: 6b51b24ad2b27fa523a92fdd5a82fe4f1e564a7bfd375ecf519d390e1aecd97e
                                                                              • Instruction Fuzzy Hash: 7E11E034F01126EFCB58DE18C448A1EB7A2FF8D220F16852AD8098B350DB70E851CBE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \pl
                                                                              • API String ID: 0-2208718379
                                                                              • Opcode ID: b6499a00a78bd653f6cd58ed54d1da0eda448cb3b287fe176461e45af3ba4311
                                                                              • Instruction ID: c03d42d1a78af17172c2310afa8f4a3b8c3303b02baae677f2d8fff25b149501
                                                                              • Opcode Fuzzy Hash: b6499a00a78bd653f6cd58ed54d1da0eda448cb3b287fe176461e45af3ba4311
                                                                              • Instruction Fuzzy Hash: 3DE0C2227857061BA780997D988177ABACAABC5120B48C136AC4987B82DD24D8089379
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677554274.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dcd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 29c577ae0c8d2d8c71c9a9adf3677b133e19fef85174669b37746daf2b451f6f
                                                                              • Instruction ID: 0228bc0dbed2f01f6af0de2eea91369adb7ac1e25a897a59620b858e56f6eca6
                                                                              • Opcode Fuzzy Hash: 29c577ae0c8d2d8c71c9a9adf3677b133e19fef85174669b37746daf2b451f6f
                                                                              • Instruction Fuzzy Hash: 7B42147245E3D58FD3434BB498692823FB0AF57260B0B05DBD4C5CF0B7E1A95A5ACB22
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7803920f9d460310be50e96d55c1701638f053be64406dd63db0e7c48547782b
                                                                              • Instruction ID: b2587a836c52e8481d80d97eb75d01a8ce8abedfdd84f9cd656bdac33f0c878a
                                                                              • Opcode Fuzzy Hash: 7803920f9d460310be50e96d55c1701638f053be64406dd63db0e7c48547782b
                                                                              • Instruction Fuzzy Hash: 18D1F370E002189FCB55DF68C544BAEBBB6EF89314F20846AD51ADB791CB31EC46CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5ae4c9f85118732d39eca229bc523fe10840035f841b576dc54c78b92da55cc1
                                                                              • Instruction ID: db50836f45ad113b51de45dfaf0762048b557dd2a8f7b4ccebd435c8e37b1fa3
                                                                              • Opcode Fuzzy Hash: 5ae4c9f85118732d39eca229bc523fe10840035f841b576dc54c78b92da55cc1
                                                                              • Instruction Fuzzy Hash: E1D12631A04215DFC752CF68C8C0AABBBA6EF89314F15C557D855EB392DB31E802CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 09f6a77ea90954981a47c645f123434a8c8341681efd797fb1cce2020c0617f5
                                                                              • Instruction ID: 776f0fcd977b57f16b5eeec0d67e3664d4590cc8d5b1c1ca3008e66d086f4373
                                                                              • Opcode Fuzzy Hash: 09f6a77ea90954981a47c645f123434a8c8341681efd797fb1cce2020c0617f5
                                                                              • Instruction Fuzzy Hash: 4EC1A134B043548FDB45AB78886576E7BF2AFCA304F15886AD449DB792EF34CC0A8B51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9f802815680e53a0bf92ede186762ab756b7d6f606b528ba29974d84f853554b
                                                                              • Instruction ID: 806d737cac5dd49ad3d80a217ef7afcece4cd716750ae3b04719d4d3cd55897b
                                                                              • Opcode Fuzzy Hash: 9f802815680e53a0bf92ede186762ab756b7d6f606b528ba29974d84f853554b
                                                                              • Instruction Fuzzy Hash: B991F030B002249FD714AB78C8987AEB6E39FC9304F15C46AE446DB7D2DE35DC4687A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ff09d438ac17515114c75f0dae7c88302afd7a111f6a521d6f1ff8418896bcca
                                                                              • Instruction ID: 2ede786a91a052adcedb41b33f7c594dd5d8d8238d85d04be8f7f6060e6f32f2
                                                                              • Opcode Fuzzy Hash: ff09d438ac17515114c75f0dae7c88302afd7a111f6a521d6f1ff8418896bcca
                                                                              • Instruction Fuzzy Hash: A5716F34B002158BDB58ABB4D4697AE76E3AFC9304F148829E806DB780EF74DC468B95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a69ea7cbc799d5414bc9db76e22107f6adf04502847b9c2f88d3b16c072386c3
                                                                              • Instruction ID: d510c6cc77421725fbe4f5e3add3b515d5f1ff116067d8f3dacf6b3480c7ea3a
                                                                              • Opcode Fuzzy Hash: a69ea7cbc799d5414bc9db76e22107f6adf04502847b9c2f88d3b16c072386c3
                                                                              • Instruction Fuzzy Hash: 97711A34B002169FDF66DF29C488A6A7BE5EF89610F1A40AAE805CB361DB74DC41CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d15c4aa05924fa11728465c1fc00e1254777062a4249a9c5963d7b19fd83a613
                                                                              • Instruction ID: 697841b16b9f816ef23c2998009da7146c3f9cdf891e5b6438edc60caf04aaf1
                                                                              • Opcode Fuzzy Hash: d15c4aa05924fa11728465c1fc00e1254777062a4249a9c5963d7b19fd83a613
                                                                              • Instruction Fuzzy Hash: 6F61CF70B002249FD714AB78C99976EB6E3AFC9304F14C429E416AB7D1CE75EC81C7A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b682303bdccd6001719a11c75f4cdce00f1bfe86c7e67a567d496b345892e68f
                                                                              • Instruction ID: e1b209c2837056fc0b7f3896686df9820cf3afae7fe449564e9d50f9ee068997
                                                                              • Opcode Fuzzy Hash: b682303bdccd6001719a11c75f4cdce00f1bfe86c7e67a567d496b345892e68f
                                                                              • Instruction Fuzzy Hash: C351D470E002258FDB94EF68D545AAEB7F2FB4C354F56845AD406AB381DB34EC45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7fe4e91a91e2e609cf4bdc035b50d937d9e667c86da2e2dd2af15de61e2c7d23
                                                                              • Instruction ID: bc3204e05dd705afbd153eb469612eecd710668aaae39bc1bdaaf89f20e00851
                                                                              • Opcode Fuzzy Hash: 7fe4e91a91e2e609cf4bdc035b50d937d9e667c86da2e2dd2af15de61e2c7d23
                                                                              • Instruction Fuzzy Hash: 79415F34B402158FDF589BB4D86976E7AF6AFC8244F14442AE806DB790EF74CC46CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6e40e160615adc619e751018409ae3c62d5fc413daf06f4fa611271431c23a6f
                                                                              • Instruction ID: 9f8d42478525aa8181b31754f1f3b29e5f613e80a1177dc26f26aa7e23323612
                                                                              • Opcode Fuzzy Hash: 6e40e160615adc619e751018409ae3c62d5fc413daf06f4fa611271431c23a6f
                                                                              • Instruction Fuzzy Hash: 8241C371A00259DFDF52CFA4C844ADEBFB2AF4E310F008156E995AB391D332E955CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ef4416f985faa01101a37a8732dc0c0e6004e64186ff82980b86aa91cabd56a5
                                                                              • Instruction ID: 0d132c2383c4a9ab9f9142056f96003aa6721d65c0c572201685ec137c7fc1ef
                                                                              • Opcode Fuzzy Hash: ef4416f985faa01101a37a8732dc0c0e6004e64186ff82980b86aa91cabd56a5
                                                                              • Instruction Fuzzy Hash: 75312934E042549FD795DB29C944ADABBF2AB4D300F15C466E845EB352DB30DC4ACB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677350784.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dbd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 73a746ce1c4fad6ba324f26746ff9cd64c1607042489c098daa1e335aafd93f2
                                                                              • Instruction ID: 528634af52a720fe2cdc77786cbd8dd2968b71e2864764089e9b8a32725937ce
                                                                              • Opcode Fuzzy Hash: 73a746ce1c4fad6ba324f26746ff9cd64c1607042489c098daa1e335aafd93f2
                                                                              • Instruction Fuzzy Hash: 07214CB1504200DFDB14CF14D9C0B66BFA7FB99328F24856DE90A4B246D336D846C7B1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677350784.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dbd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1bbc1ba8adda77cf5204ef8041970c3f37c17a45b72f5d03187ea53a4e26ba6f
                                                                              • Instruction ID: bffdaead173f35660c1f4c18ca7760f8994c606ab528237fccd3f82b0e44b69d
                                                                              • Opcode Fuzzy Hash: 1bbc1ba8adda77cf5204ef8041970c3f37c17a45b72f5d03187ea53a4e26ba6f
                                                                              • Instruction Fuzzy Hash: BC2125B1504340DFDB05DF18D8C0B66BF67FB98364F288569E90A4B246D336D846C7B1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677554274.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dcd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 45b495669450b125d1772518ba47ec30c6916a94e97828cee90ca8c8a3433d9b
                                                                              • Instruction ID: bc4ea568af80198beb138930a92596ffe6c47ade9b9c304bae8f4f7242740470
                                                                              • Opcode Fuzzy Hash: 45b495669450b125d1772518ba47ec30c6916a94e97828cee90ca8c8a3433d9b
                                                                              • Instruction Fuzzy Hash: EF21C5B1508245DFDB08DF14D9C4F26BB66FB84314F28C96DD9494B246C336D846DAB1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 002419252f056b47618e37c7afba7d75b4da40addc35d08cbf9e0cf04836db9d
                                                                              • Instruction ID: 8f521e03620c2929a4e69f41cde03c372038838c2851a9d08f6a3b9b2acc2fd3
                                                                              • Opcode Fuzzy Hash: 002419252f056b47618e37c7afba7d75b4da40addc35d08cbf9e0cf04836db9d
                                                                              • Instruction Fuzzy Hash: 9C213770A0422ADFEB15DFA0D985BAEBBB5FF48700F20402AE801BB350DB75D945CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0fcf4ea203c04c6aa22b5caa949fd2b1c994c17c2a9b56c4dd94a47ebda0f98c
                                                                              • Instruction ID: 70312161f5ec67edbe4e67645dbc524ef757e7cddabc18ff8ace425310f63f53
                                                                              • Opcode Fuzzy Hash: 0fcf4ea203c04c6aa22b5caa949fd2b1c994c17c2a9b56c4dd94a47ebda0f98c
                                                                              • Instruction Fuzzy Hash: 9911B472A0015A9BDF50CF68C840B5FBFA2AF8A310F048556D5589B396D371E851C7A8
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677350784.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dbd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c66214ac6492c772c1380c650795b37f074d04fa4bd200646b971f02ef69cf05
                                                                              • Instruction ID: ed37edf8f1ad3301b9ac441cb59ca5e57717844a8c8f34c57f0aba197a905c5c
                                                                              • Opcode Fuzzy Hash: c66214ac6492c772c1380c650795b37f074d04fa4bd200646b971f02ef69cf05
                                                                              • Instruction Fuzzy Hash: 3911E676404280CFDF11CF10D9C4B56BFB2FB95324F28C6A9D8060B656C33AD856CBA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.677350784.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_dbd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c66214ac6492c772c1380c650795b37f074d04fa4bd200646b971f02ef69cf05
                                                                              • Instruction ID: 21907fabc7e7b725c07cd04390855da08bf9cfa285224ac34b96520746b3d819
                                                                              • Opcode Fuzzy Hash: c66214ac6492c772c1380c650795b37f074d04fa4bd200646b971f02ef69cf05
                                                                              • Instruction Fuzzy Hash: BB11D376804280CFDB12CF14D9C4B56BF72FB84324F28C6A9DC050B616C336D856CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 66c5771beacd57b737833a9dfcb3951bf644b0f1896f22c6bb502777da5b9280
                                                                              • Instruction ID: 39e30c996da3098ee62089daaa492272ed9dbd04c5f8a3c54c9f02bd7a8b5a58
                                                                              • Opcode Fuzzy Hash: 66c5771beacd57b737833a9dfcb3951bf644b0f1896f22c6bb502777da5b9280
                                                                              • Instruction Fuzzy Hash: 88117C70A142699FEB15DFB4D884AAEBBB2EF49700F144429E481A7350DB719845CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 07a532e4d68fa4b7a5e96ce1a6217c32060374ba064b9238684f0c83af91eb84
                                                                              • Instruction ID: 200772db9026a7fd2e95b37f9a7d583024f8bfb295cc0f3b2a1dd6af7940ef63
                                                                              • Opcode Fuzzy Hash: 07a532e4d68fa4b7a5e96ce1a6217c32060374ba064b9238684f0c83af91eb84
                                                                              • Instruction Fuzzy Hash: FD118BB6E00268AFCF05CFD8D8018DEBBF5FF4C310B00416AE515A7254D73169098BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000006.00000002.707475754.0000000006430000.00000040.00000800.00020000.00000000.sdmp, Offset: 06430000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_6_2_6430000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d33a274336b3e88497c0ef0c4279a575c734d47a538812c96c0c7906af1cfd75
                                                                              • Instruction ID: 2f776b1c079e0ca2e1ab0b756a94f7e29973d81f0f3e5356971c2c47ca1f329a
                                                                              • Opcode Fuzzy Hash: d33a274336b3e88497c0ef0c4279a575c734d47a538812c96c0c7906af1cfd75
                                                                              • Instruction Fuzzy Hash: B8E08639F052148FDB449B35A84827D7BA3F7CC222B158967E90AD3340CF344C128740
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%