Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
Analysis ID:756189
MD5:f976242274e3a8b6859f43212321e5cd
SHA1:4de5d552dd1a3a7e2eb57a831d1819ada42b53ae
SHA256:49aa45b9a4eb9642dc458e079196600823bc99b49c9003b4327261ba47b3ae7d
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Antivirus / Scanner detection for submitted sample
Tries to steal Mail credentials (via file / registry access)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "info2@obynnehhhan.com", "Password": "G$MUuYG3", "Host": "smtp.obynnehhhan.com"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x306fd:$a3: MailAccountConfiguration
      • 0x30716:$a5: SmtpAccountConfiguration
      • 0x306dd:$a8: set_BindingAccountConfiguration
      • 0x2f67c:$a11: get_securityProfile
      • 0x2f51d:$a12: get_useSeparateFolderTree
      • 0x30e4f:$a13: get_DnsResolver
      • 0x2f92c:$a14: get_archivingScope
      • 0x2f754:$a15: get_providerName
      • 0x31e2a:$a17: get_priority
      • 0x31401:$a18: get_advancedParameters
      • 0x30817:$a19: get_disabledByRestriction
      • 0x2f2f6:$a20: get_LastAccessed
      • 0x2f9c6:$a21: get_avatarType
      • 0x31518:$a22: get_signaturePresets
      • 0x2ffbc:$a23: get_enableLog
      • 0x2f7d1:$a26: set_accountName
      • 0x31963:$a27: set_InternalServerPort
      • 0x2ec90:$a28: set_bindingConfigurationUID
      • 0x314de:$a29: set_IdnAddress
      • 0x31cde:$a30: set_GuidMasterKey
      • 0x2f82c:$a31: set_username
      00000001.00000002.510933505.0000000002ACC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x2e5b8:$s1: get_kbok
              • 0x2eefb:$s2: get_CHoo
              • 0x2fb49:$s3: set_passwordIsSet
              • 0x2e3bc:$s4: get_enableLog
              • 0x32a1c:$s8: torbrowser
              • 0x313f8:$s10: logins
              • 0x30d70:$s11: credential
              • 0x2d7e1:$g1: get_Clipboard
              • 0x2d7ef:$g2: get_Keyboard
              • 0x2d7fc:$g3: get_Password
              • 0x2ed9a:$g4: get_CtrlKeyDown
              • 0x2edaa:$g5: get_ShiftKeyDown
              • 0x2edbb:$g6: get_AltKeyDown
              0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2eafd:$a3: MailAccountConfiguration
              • 0x2eb16:$a5: SmtpAccountConfiguration
              • 0x2eadd:$a8: set_BindingAccountConfiguration
              • 0x2da7c:$a11: get_securityProfile
              • 0x2d91d:$a12: get_useSeparateFolderTree
              • 0x2f24f:$a13: get_DnsResolver
              • 0x2dd2c:$a14: get_archivingScope
              • 0x2db54:$a15: get_providerName
              • 0x3022a:$a17: get_priority
              • 0x2f801:$a18: get_advancedParameters
              • 0x2ec17:$a19: get_disabledByRestriction
              • 0x2d6f6:$a20: get_LastAccessed
              • 0x2ddc6:$a21: get_avatarType
              • 0x2f918:$a22: get_signaturePresets
              • 0x2e3bc:$a23: get_enableLog
              • 0x2dbd1:$a26: set_accountName
              • 0x2fd63:$a27: set_InternalServerPort
              • 0x2d090:$a28: set_bindingConfigurationUID
              • 0x2f8de:$a29: set_IdnAddress
              • 0x300de:$a30: set_GuidMasterKey
              • 0x2dc2c:$a31: set_username
              1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 26 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeReversingLabs: Detection: 24%
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeVirustotal: Detection: 30%Perma Link
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeAvira: detected
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeJoe Sandbox ML: detected
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info2@obynnehhhan.com", "Password": "G$MUuYG3", "Host": "smtp.obynnehhhan.com"}
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPE
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://PcwsIt.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com_
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comrsiva
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comue9
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252715733.0000000000E9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252922345.0000000000E9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252715733.0000000000E9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/aCo
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510896649.0000000002AC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.285593819.0000000000CEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 3916, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b06A21515u002dB589u002d4A9Cu002dA54Au002d22BA57400E29u007d/u0034CB1A907u002dEAC2u002d4C09u002d9297u002dEDA94E30EAD5.csLarge array initialization: .cctor: array initializer size 11778
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 3916, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_00E7C1F40_2_00E7C1F4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_00E7E6400_2_00E7E640
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_00E7E6500_2_00E7E650
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_070F38B00_2_070F38B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_070F38C00_2_070F38C0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_072B001A0_2_072B001A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_072B00400_2_072B0040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C2C8481_2_00C2C848
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C226181_2_00C22618
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C21FF01_2_00C21FF0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C2F5B01_2_00C2F5B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C29DB81_2_00C29DB8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C4CB001_2_00C4CB00
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C494701_2_00C49470
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C44C0C1_2_00C44C0C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C435501_2_00C43550
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C4A8E01_2_00C4A8E0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C4E0E81_2_00C4E0E8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C400401_2_00C40040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C40BA81_2_00C40BA8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F94E601_2_00F94E60
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F9B0E81_2_00F9B0E8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F965801_2_00F96580
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_010E46A01_2_010E46A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_010E45B01_2_010E45B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_010E46721_2_010E4672
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_010E46901_2_010E4690
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexYhphEgZvlyOIRayjZxngr.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000000.241444260.0000000000512000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamezaNJ.exe6 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.300732780.0000000007100000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286913157.0000000002991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286913157.0000000002991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286913157.0000000002991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexYhphEgZvlyOIRayjZxngr.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.285593819.0000000000CEB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.506084189.0000000000AF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000000.284033383.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexYhphEgZvlyOIRayjZxngr.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeBinary or memory string: OriginalFilenamezaNJ.exe6 vs SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeReversingLabs: Detection: 24%
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeVirustotal: Detection: 30%
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.511302808.0000000002B11000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.510000.0.unpack, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 0_2_070F0015 push eax; iretd 0_2_070F0016
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C27A37 push edi; retn 0000h1_2_00C27A39
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C4DA58 pushfd ; ret 1_2_00C4DA59
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C47DC9 push 8BFFFFFFh; retf 1_2_00C47DD8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F90434 push eax; ret 1_2_00F90442
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F9A651 push es; ret 1_2_00F9A67E
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00F90DD0 push 3C00F8CBh; retf 1_2_00F90DD5
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeStatic PE information: 0xC6C06793 [Sat Aug 31 17:29:55 2075 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 7.59561068934023
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 3916, type: MEMORYSTR
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe TID: 2888Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe TID: 6076Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe TID: 3092Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe TID: 3372Thread sleep count: 9862 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeWindow / User API: threadDelayed 9862Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeCode function: 1_2_00C4C8C0 LdrInitializeThunk,1_2_00C4C8C0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.510933505.0000000002ACC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 3916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cbaaf0.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3cf0110.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.3c5d0d0.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.510933505.0000000002ACC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 3916, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe PID: 4520, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Input Capture
                1
                Process Discovery
                Remote Desktop Protocol1
                Input Capture
                Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares11
                Archive Collected Data
                Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object Model1
                Data from Local System
                Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets114
                System Information Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe24%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe31%VirustotalBrowse
                SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe100%AviraHEUR/AGEN.1249296
                SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                0.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.510000.0.unpack100%AviraHEUR/AGEN.1249296Download File
                1.0.SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.fontbureau.com_0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/aCo0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.fontbureau.comrsiva0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                https://api.ipify.org%GETMozilla/5.00%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://api.ipify.org%0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://www.fontbureau.comue90%URL Reputationsafe
                http://PcwsIt.com0%VirustotalBrowse
                http://PcwsIt.com0%Avira URL Cloudsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://DynDns.comDynDNSSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp/aCoSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252922345.0000000000E9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252715733.0000000000E9B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com_SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            low
                            http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000003.252715733.0000000000E9B000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.comrsivaSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.ipify.org%GETMozilla/5.0SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  low
                                  http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://PcwsIt.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.298799636.0000000006A02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.org%SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000002.510896649.0000000002AC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    low
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipSecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comue9SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe, 00000000.00000002.286227927.0000000000E97000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    No contacted IP infos
                                    Joe Sandbox Version:36.0.0 Rainbow Opal
                                    Analysis ID:756189
                                    Start date and time:2022-11-29 19:34:38 +01:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 7m 35s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:11
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 94%
                                    • Number of executed functions: 85
                                    • Number of non-executed functions: 8
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    TimeTypeDescription
                                    19:35:47API Interceptor570x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1216
                                    Entropy (8bit):5.355304211458859
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.590447173134643
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    File size:836608
                                    MD5:f976242274e3a8b6859f43212321e5cd
                                    SHA1:4de5d552dd1a3a7e2eb57a831d1819ada42b53ae
                                    SHA256:49aa45b9a4eb9642dc458e079196600823bc99b49c9003b4327261ba47b3ae7d
                                    SHA512:de657d8cb7ee401139a414964c333053bc6570e1d29b4125cdc440dc61637b0597ee4c1bb0eafd5a8855727bc6089430e3b80c457c6c5a19ce1ef2f769957b80
                                    SSDEEP:12288:oOvpYqjMN+3gYffB411R77TeB3EqcDFRLJtXsxFXynzw5tkD3twn:3Yqy+t8N7qNEtFRLJtXsxkc5aD9
                                    TLSH:70053A2297B1C906F93389ED62EC5A114DA821C148B4C949CC573DC15E78E6BF4FCAFA
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....g................0.................. ........@.. ....................... ............@................................
                                    Icon Hash:00828e8e8686b000
                                    Entrypoint:0x4cda92
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xC6C06793 [Sat Aug 31 17:29:55 2075 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcda400x4f.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x370.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xcda240x1c.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xcba980xcbc00False0.7869320360429448data7.59561068934023IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xce0000x3700x400False0.3662109375data2.781211359728944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xd00000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0xce0580x314data
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    No network behavior found

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:19:35:34
                                    Start date:29/11/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    Imagebase:0x510000
                                    File size:836608 bytes
                                    MD5 hash:F976242274E3A8B6859F43212321E5CD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.293904682.0000000003BCF000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.290098230.0000000002C4A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:1
                                    Start time:19:35:54
                                    Start date:29/11/2022
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.3512.499.exe
                                    Imagebase:0x610000
                                    File size:836608 bytes
                                    MD5 hash:F976242274E3A8B6859F43212321E5CD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.283863668.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.510933505.0000000002ACC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000001.00000002.510085128.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:9.7%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:128
                                      Total number of Limit Nodes:7
                                      execution_graph 19735 72b7a88 19736 72b7c13 19735->19736 19737 72b7aae 19735->19737 19737->19736 19739 72b7d08 PostMessageW 19737->19739 19740 72b7d74 19739->19740 19740->19737 19687 70fbb18 19688 70fbb60 WriteProcessMemory 19687->19688 19690 70fbbb7 19688->19690 19691 e7b770 GetCurrentProcess 19692 e7b7e3 19691->19692 19693 e7b7ea GetCurrentThread 19691->19693 19692->19693 19694 e7b827 GetCurrentProcess 19693->19694 19695 e7b820 19693->19695 19696 e7b85d 19694->19696 19695->19694 19697 e7b885 GetCurrentThreadId 19696->19697 19698 e7b8b6 19697->19698 19741 70fba28 19742 70fba68 VirtualAllocEx 19741->19742 19744 70fbaa5 19742->19744 19745 e740d0 19746 e740e2 19745->19746 19750 e740ee 19746->19750 19751 e741e0 19746->19751 19748 e7410d 19756 e73c60 19750->19756 19752 e74205 19751->19752 19760 e742e0 19752->19760 19764 e742d0 19752->19764 19757 e73c6b 19756->19757 19772 e7583c 19757->19772 19759 e76a64 19759->19748 19762 e74307 19760->19762 19761 e743e4 19761->19761 19762->19761 19768 e73e4c 19762->19768 19766 e74307 19764->19766 19765 e743e4 19765->19765 19766->19765 19767 e73e4c CreateActCtxA 19766->19767 19767->19765 19769 e75370 CreateActCtxA 19768->19769 19771 e75433 19769->19771 19771->19771 19773 e75847 19772->19773 19776 e7585c 19773->19776 19775 e76b0d 19775->19759 19777 e75867 19776->19777 19780 e7588c 19777->19780 19779 e76be2 19779->19775 19781 e75897 19780->19781 19784 e758bc 19781->19784 19783 e76ce2 19783->19779 19785 e758c7 19784->19785 19787 e771a9 19785->19787 19790 e77448 19785->19790 19786 e7743c 19786->19783 19787->19786 19795 e7b498 19787->19795 19791 e773e4 19790->19791 19793 e7744f 19790->19793 19792 e7743c 19791->19792 19794 e7b498 2 API calls 19791->19794 19792->19787 19793->19787 19794->19792 19796 e7b4c9 19795->19796 19797 e7b4ed 19796->19797 19800 e7b647 19796->19800 19804 e7b658 19796->19804 19797->19786 19801 e7b655 19800->19801 19802 e7b69f 19801->19802 19808 e7a10c 19801->19808 19802->19797 19805 e7b665 19804->19805 19806 e7b69f 19805->19806 19807 e7a10c 2 API calls 19805->19807 19806->19797 19807->19806 19809 e7a117 19808->19809 19810 e7c398 19809->19810 19812 e7bf34 19809->19812 19813 e7bf3f 19812->19813 19814 e758bc 2 API calls 19813->19814 19815 e7c407 19814->19815 19819 e7e188 19815->19819 19825 e7e179 19815->19825 19816 e7c440 19816->19810 19821 e7e205 19819->19821 19822 e7e1b9 19819->19822 19820 e7e1c5 19820->19816 19821->19816 19822->19820 19823 e7e5f8 LoadLibraryExW GetModuleHandleW 19822->19823 19824 e7e608 LoadLibraryExW GetModuleHandleW 19822->19824 19823->19821 19824->19821 19826 e7e188 19825->19826 19827 e7e1c5 19826->19827 19828 e7e5f8 LoadLibraryExW GetModuleHandleW 19826->19828 19829 e7e608 LoadLibraryExW GetModuleHandleW 19826->19829 19827->19816 19828->19827 19829->19827 19830 70fbc38 19831 70fbc83 ReadProcessMemory 19830->19831 19833 70fbcc7 19831->19833 19699 70fb890 19700 70fb8d5 SetThreadContext 19699->19700 19702 70fb91d 19700->19702 19703 e79378 19704 e79387 19703->19704 19707 e79460 19703->19707 19715 e79470 19703->19715 19708 e79483 19707->19708 19710 e7949b 19708->19710 19723 e796ea 19708->19723 19727 e796f8 19708->19727 19709 e79493 19709->19710 19711 e79698 GetModuleHandleW 19709->19711 19710->19704 19712 e796c5 19711->19712 19712->19704 19716 e79483 19715->19716 19717 e7949b 19716->19717 19721 e796ea LoadLibraryExW 19716->19721 19722 e796f8 LoadLibraryExW 19716->19722 19717->19704 19718 e79493 19718->19717 19719 e79698 GetModuleHandleW 19718->19719 19720 e796c5 19719->19720 19720->19704 19721->19718 19722->19718 19724 e7970c 19723->19724 19726 e79731 19724->19726 19731 e787e0 19724->19731 19726->19709 19728 e7970c 19727->19728 19729 e787e0 LoadLibraryExW 19728->19729 19730 e79731 19728->19730 19729->19730 19730->19709 19732 e798d8 LoadLibraryExW 19731->19732 19734 e79951 19732->19734 19734->19726 19834 e7fdd8 19835 e7fe40 CreateWindowExW 19834->19835 19837 e7fefc 19835->19837 19837->19837 19838 70fbe30 19839 70fbeb9 CreateProcessA 19838->19839 19841 70fc07b 19839->19841 19842 e7b998 DuplicateHandle 19843 e7ba2e 19842->19843 19844 70fb7b0 19845 70fb7f0 ResumeThread 19844->19845 19847 70fb821 19845->19847

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 00E7B7D0
                                      • GetCurrentThread.KERNEL32 ref: 00E7B80D
                                      • GetCurrentProcess.KERNEL32 ref: 00E7B84A
                                      • GetCurrentThreadId.KERNEL32 ref: 00E7B8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: b7d23e0652492c8826e436e3be96ba25f6c544ac777ce2e08f280a6adc1af9b0
                                      • Instruction ID: fa51a7d29cab2a676d4b7cb0e443dd638df504a5a1ffbe1e48befb3fd0752500
                                      • Opcode Fuzzy Hash: b7d23e0652492c8826e436e3be96ba25f6c544ac777ce2e08f280a6adc1af9b0
                                      • Instruction Fuzzy Hash: 4F6148B0E04249DFDB54CFA9D948BEEBBF1AF88308F14855AE409B7290D7705949CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 00E7B7D0
                                      • GetCurrentThread.KERNEL32 ref: 00E7B80D
                                      • GetCurrentProcess.KERNEL32 ref: 00E7B84A
                                      • GetCurrentThreadId.KERNEL32 ref: 00E7B8A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 2082a55f05ae50d0e541f41c6ef42873444101a8287ed0308a553267ad262dff
                                      • Instruction ID: 9e3ab49f2ef3233fdb0f5035c0b3b73383f2fcd2ebe804bf17b447456a9276f7
                                      • Opcode Fuzzy Hash: 2082a55f05ae50d0e541f41c6ef42873444101a8287ed0308a553267ad262dff
                                      • Instruction Fuzzy Hash: 645154B09043488FDB14CFA9D548BAEBBF5BF88308F24C45AE419B7250D774A844CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 83 70fbe30-70fbec5 85 70fbefe-70fbf1e 83->85 86 70fbec7-70fbed1 83->86 93 70fbf57-70fbf86 85->93 94 70fbf20-70fbf2a 85->94 86->85 87 70fbed3-70fbed5 86->87 88 70fbef8-70fbefb 87->88 89 70fbed7-70fbee1 87->89 88->85 91 70fbee5-70fbef4 89->91 92 70fbee3 89->92 91->91 96 70fbef6 91->96 92->91 102 70fbfbf-70fc079 CreateProcessA 93->102 103 70fbf88-70fbf92 93->103 94->93 95 70fbf2c-70fbf2e 94->95 97 70fbf51-70fbf54 95->97 98 70fbf30-70fbf3a 95->98 96->88 97->93 100 70fbf3e-70fbf4d 98->100 101 70fbf3c 98->101 100->100 104 70fbf4f 100->104 101->100 114 70fc07b-70fc081 102->114 115 70fc082-70fc108 102->115 103->102 105 70fbf94-70fbf96 103->105 104->97 107 70fbfb9-70fbfbc 105->107 108 70fbf98-70fbfa2 105->108 107->102 109 70fbfa6-70fbfb5 108->109 110 70fbfa4 108->110 109->109 112 70fbfb7 109->112 110->109 112->107 114->115 125 70fc10a-70fc10e 115->125 126 70fc118-70fc11c 115->126 125->126 127 70fc110 125->127 128 70fc11e-70fc122 126->128 129 70fc12c-70fc130 126->129 127->126 128->129 132 70fc124 128->132 130 70fc132-70fc136 129->130 131 70fc140-70fc144 129->131 130->131 133 70fc138 130->133 134 70fc156-70fc15d 131->134 135 70fc146-70fc14c 131->135 132->129 133->131 136 70fc15f-70fc16e 134->136 137 70fc174 134->137 135->134 136->137
                                      APIs
                                      • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 070FC066
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 61103b9dfdb93238a8f2a0e8a63ffd2d309b93b6d0ec6ce656d4c063d72a3667
                                      • Instruction ID: 00520cdd0cb91e6259aefa6787fb1a82b8bbe3db47ce68ca8c3b32d4c3eaea85
                                      • Opcode Fuzzy Hash: 61103b9dfdb93238a8f2a0e8a63ffd2d309b93b6d0ec6ce656d4c063d72a3667
                                      • Instruction Fuzzy Hash: F0914BB1D00219CFEB24CF64C8817EEBAB2BF89314F058669D949A7680D7749985CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 139 e79470-e79478 140 e79483-e79485 139->140 141 e7947e call e77154 139->141 142 e79487 140->142 143 e7949b-e7949f 140->143 141->140 192 e7948d call e796ea 142->192 193 e7948d call e796f8 142->193 144 e794b3-e794f4 143->144 145 e794a1-e794ab 143->145 150 e794f6-e794fe 144->150 151 e79501-e7950f 144->151 145->144 146 e79493-e79495 146->143 147 e795d0-e79690 146->147 187 e79692-e79695 147->187 188 e79698-e796c3 GetModuleHandleW 147->188 150->151 152 e79533-e79535 151->152 153 e79511-e79516 151->153 157 e79538-e7953f 152->157 155 e79521 153->155 156 e79518-e7951f call e78788 153->156 159 e79523-e79531 155->159 156->159 160 e79541-e79549 157->160 161 e7954c-e79553 157->161 159->157 160->161 164 e79555-e7955d 161->164 165 e79560-e79569 call e78798 161->165 164->165 170 e79576-e7957b 165->170 171 e7956b-e79573 165->171 172 e7957d-e79584 170->172 173 e79599-e7959d 170->173 171->170 172->173 174 e79586-e79596 call e787a8 call e787b8 172->174 177 e795a3-e795a6 173->177 174->173 180 e795c9-e795cf 177->180 181 e795a8-e795c6 177->181 181->180 187->188 189 e796c5-e796cb 188->189 190 e796cc-e796e0 188->190 189->190 192->146 193->146
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00E796B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 6626918a6ea49fe8e38f51f597c9ea4cb72c0015be87a46d5a4363ca83e36403
                                      • Instruction ID: 30dc516ff11445cf1a978026a1c2db3d496d55fb246f03048f44010b79b6e59b
                                      • Opcode Fuzzy Hash: 6626918a6ea49fe8e38f51f597c9ea4cb72c0015be87a46d5a4363ca83e36403
                                      • Instruction Fuzzy Hash: 73715A70A00B158FDB24DF29D14575ABBF1BF88308F108A2ED44AE7A51D734E805CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 194 e7fdcd-e7fe3e 195 e7fe40-e7fe46 194->195 196 e7fe49-e7fe50 194->196 195->196 197 e7fe52-e7fe58 196->197 198 e7fe5b-e7fe93 196->198 197->198 199 e7fe9b-e7fefa CreateWindowExW 198->199 200 e7ff03-e7ff3b 199->200 201 e7fefc-e7ff02 199->201 205 e7ff3d-e7ff40 200->205 206 e7ff48 200->206 201->200 205->206 207 e7ff49 206->207 207->207
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E7FEEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 2021b4d0715c52c28cfd7cba01bc0fecb9be4de29eefda3b142b8e32d429d397
                                      • Instruction ID: 45b2f985a8d9872869931682dbe085a7211e2b37d7c2bed27ccbf925cc883472
                                      • Opcode Fuzzy Hash: 2021b4d0715c52c28cfd7cba01bc0fecb9be4de29eefda3b142b8e32d429d397
                                      • Instruction Fuzzy Hash: F451BFB1D003499FDB14CFA9D884ADEBBB5BF88354F24822AE419AB250D7749985CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 208 e7fdd8-e7fe3e 209 e7fe40-e7fe46 208->209 210 e7fe49-e7fe50 208->210 209->210 211 e7fe52-e7fe58 210->211 212 e7fe5b-e7fefa CreateWindowExW 210->212 211->212 214 e7ff03-e7ff3b 212->214 215 e7fefc-e7ff02 212->215 219 e7ff3d-e7ff40 214->219 220 e7ff48 214->220 215->214 219->220 221 e7ff49 220->221 221->221
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00E7FEEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 1476f233608c9b12f3f0bdba014a1880fc531bca6a35e8fc85f559223f74d4c4
                                      • Instruction ID: 15ffa539bfb1609569c0733ec074aa56d78fba217be7776c39a6b678e816fff2
                                      • Opcode Fuzzy Hash: 1476f233608c9b12f3f0bdba014a1880fc531bca6a35e8fc85f559223f74d4c4
                                      • Instruction Fuzzy Hash: 9E41CFB1D00309DFDB14CF99D884ADEBBB5BF88354F24812AE819AB250D7749985CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 222 e75365-e75431 CreateActCtxA 224 e75433-e75439 222->224 225 e7543a-e75494 222->225 224->225 232 e75496-e75499 225->232 233 e754a3-e754a7 225->233 232->233 234 e754a9-e754b5 233->234 235 e754b8 233->235 234->235 237 e754b9 235->237 237->237
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00E75421
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 339f472853a439bfd7721e58430433ed3f40f6663addd2477d20a2eebe3983e3
                                      • Instruction ID: 7739ca982544907c731a7472436daa649041633049248b0c90920aeadfff7cdb
                                      • Opcode Fuzzy Hash: 339f472853a439bfd7721e58430433ed3f40f6663addd2477d20a2eebe3983e3
                                      • Instruction Fuzzy Hash: BB411671D04628CFDB24CFA5C884BDDBBB5BF89308F14806AD409BB251DBB56946CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 238 e73e4c-e75431 CreateActCtxA 241 e75433-e75439 238->241 242 e7543a-e75494 238->242 241->242 249 e75496-e75499 242->249 250 e754a3-e754a7 242->250 249->250 251 e754a9-e754b5 250->251 252 e754b8 250->252 251->252 254 e754b9 252->254 254->254
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00E75421
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: b2608579350feaf2a4ea6f4b6cd19684f1049892d7924d9c2a604a49ef5dfba2
                                      • Instruction ID: aecd4b5660382f94fb33835f3df81a01df68b9c30bda14879eabd9b7fa09c91e
                                      • Opcode Fuzzy Hash: b2608579350feaf2a4ea6f4b6cd19684f1049892d7924d9c2a604a49ef5dfba2
                                      • Instruction Fuzzy Hash: C641D271C04618CBDB24CFA9C848B9EBBB5BF89308F14815AD419BB251DBB56985CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 255 70fbb18-70fbb66 257 70fbb68-70fbb74 255->257 258 70fbb76-70fbbb5 WriteProcessMemory 255->258 257->258 260 70fbbbe-70fbbee 258->260 261 70fbbb7-70fbbbd 258->261 261->260
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 070FBBA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 8019d645f6745b96a43e356b7f4ca0176ca01390caec1f92890ced4614541d06
                                      • Instruction ID: a0549e5910a24c0eae8e19c255226e793d26a46ddb1921637a3da84a8f141f53
                                      • Opcode Fuzzy Hash: 8019d645f6745b96a43e356b7f4ca0176ca01390caec1f92890ced4614541d06
                                      • Instruction Fuzzy Hash: 572126B19003599FCB00CFA9C884BEEBBF5EB88354F10842AE919A7640D7789944CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 265 e7b992-e7ba2c DuplicateHandle 266 e7ba35-e7ba52 265->266 267 e7ba2e-e7ba34 265->267 267->266
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E7BA1F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 09036bcee81ff21dbeef4f00ff6115ff1001fa5beebd27f5731b2a655c1b59c5
                                      • Instruction ID: 07a01db71a3e435dc4777bba23b7f3e62bfe7b59623115d6f93871a396a55b39
                                      • Opcode Fuzzy Hash: 09036bcee81ff21dbeef4f00ff6115ff1001fa5beebd27f5731b2a655c1b59c5
                                      • Instruction Fuzzy Hash: 892103B5900248EFCB10CFA9D884AEEBFF4EF48324F14841AE854B7250D374A945CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 280 70fbc38-70fbcc5 ReadProcessMemory 283 70fbcce-70fbcfe 280->283 284 70fbcc7-70fbccd 280->284 284->283
                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 070FBCB8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: d42ad99e976cf50605d25192974d29b059e7c32f718ecfbd172b972b8180976d
                                      • Instruction ID: 42148c9ede676c88e6a1c43f509193fbe18a1d8464d2a95a61080dae54bcf5f2
                                      • Opcode Fuzzy Hash: d42ad99e976cf50605d25192974d29b059e7c32f718ecfbd172b972b8180976d
                                      • Instruction Fuzzy Hash: 0C214AB18003599FCB00CFA9C8807EEBBF5FF88314F50842AE518A7240D7349900CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 270 70fb890-70fb8db 272 70fb8dd-70fb8e9 270->272 273 70fb8eb-70fb91b SetThreadContext 270->273 272->273 275 70fb91d-70fb923 273->275 276 70fb924-70fb954 273->276 275->276
                                      APIs
                                      • SetThreadContext.KERNELBASE(?,00000000), ref: 070FB90E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: ContextThread
                                      • String ID:
                                      • API String ID: 1591575202-0
                                      • Opcode ID: d58918098ac6d54882fd1915c91712bf89562c46c6c3b93e562c0fb44a08981a
                                      • Instruction ID: 027a6d930d4597120cb77588aaa61d43a36784aa0d91cf30dacfa4f4fa475e9e
                                      • Opcode Fuzzy Hash: d58918098ac6d54882fd1915c91712bf89562c46c6c3b93e562c0fb44a08981a
                                      • Instruction Fuzzy Hash: F92149B1D043099FCB50DFAAC4847EEBBF4EF88354F14842AD519A7640DB78A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E7BA1F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: eaa96b4024a1b2925c964da3b5a7c4fa1f8b8d14b35254e8f8562fc16c3f1dd0
                                      • Instruction ID: 475e37e5b60c2f5e6ac44c78486837630d28bc0af5a033a2f49d55982b4f1389
                                      • Opcode Fuzzy Hash: eaa96b4024a1b2925c964da3b5a7c4fa1f8b8d14b35254e8f8562fc16c3f1dd0
                                      • Instruction Fuzzy Hash: BC21C4B59002499FDB10CF99D884AEEBBF8EB48364F14841AE914B7350D374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E79731,00000800,00000000,00000000), ref: 00E79942
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 1424c90053dc8a6704ea0a204e9b242c2fdf89f11f428568cb03eb79ed102999
                                      • Instruction ID: 1434472262524eb2507c928fac11b12a0993759c49af16afac43ce642887d9be
                                      • Opcode Fuzzy Hash: 1424c90053dc8a6704ea0a204e9b242c2fdf89f11f428568cb03eb79ed102999
                                      • Instruction Fuzzy Hash: 7B11F4B69042499BDB10CF9AD448AEEBBF4AB98354F10842ED559B7210C374A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E79731,00000800,00000000,00000000), ref: 00E79942
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: c334d57b8cf8028b0823025c22e26d1afd80ea5c9c7adb2fa9643a04e487e371
                                      • Instruction ID: 2457ec393863096fbb337bb1ca7dd00f4ae76f6c982c4a74ca485d4e0c230542
                                      • Opcode Fuzzy Hash: c334d57b8cf8028b0823025c22e26d1afd80ea5c9c7adb2fa9643a04e487e371
                                      • Instruction Fuzzy Hash: 221114B69042498FDB10CFAAD844AEEFBF4AF88354F14842ED559B7240C374A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 070FBA96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 7b977079c3230d00adc57b853db681e2c9f48be64021b16ccae4204b09c5218d
                                      • Instruction ID: bc9441dda345749ce09ff7b4a8205762fcb52977fd4416eeccc98cf2f3e16b44
                                      • Opcode Fuzzy Hash: 7b977079c3230d00adc57b853db681e2c9f48be64021b16ccae4204b09c5218d
                                      • Instruction Fuzzy Hash: 871156B19042499FCB10DFAAC844BEEBBF5AF88364F14881AE515A7650C775A940CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: f1f02580153ff9b20d9599061756facbf34857b22b9694f0c178ba02488eb4a2
                                      • Instruction ID: e54935dfdb4bc7ce169b95c53b7af308a58427b40389b56fdbef3c1c0b812ce5
                                      • Opcode Fuzzy Hash: f1f02580153ff9b20d9599061756facbf34857b22b9694f0c178ba02488eb4a2
                                      • Instruction Fuzzy Hash: FD1166B1D043488BCB10DFAAC8447EEFBF4EF88324F14882AC519A7640C774A945CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00E796B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 1d7c40474e18e915011c355f9546b4a4d20ff9afc3f0d9e7c950d66251c39a97
                                      • Instruction ID: 739dcb987a6f39617890a346e579c62c29971d913c0930b27658cc136b80063f
                                      • Opcode Fuzzy Hash: 1d7c40474e18e915011c355f9546b4a4d20ff9afc3f0d9e7c950d66251c39a97
                                      • Instruction Fuzzy Hash: 4811E0B6D002498FCB10DF9AD844BDEFBF4AF89724F14851AD819B7610D378A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 072B7D65
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.301978254.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72b0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 3709950978fa12b70638d211b15f2f868ca4147894dbc93e6bfc47b68cb3f571
                                      • Instruction ID: dc593279070513409856a45e8ca2d0c6b852a1ee3c99c821bd4e1e3948f024f7
                                      • Opcode Fuzzy Hash: 3709950978fa12b70638d211b15f2f868ca4147894dbc93e6bfc47b68cb3f571
                                      • Instruction Fuzzy Hash: 5611E5B5800349DFDB20CF99D884BEEBBF8EB88364F10841AE514A7740D374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285416939.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c9d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d37dbfa2e3c57f7439226a323911652581d95f4592ed54b0190f1511ff04a2c3
                                      • Instruction ID: db653566ae54901710b7574b4f5d0fcd121729719d09633b2565231545e87186
                                      • Opcode Fuzzy Hash: d37dbfa2e3c57f7439226a323911652581d95f4592ed54b0190f1511ff04a2c3
                                      • Instruction Fuzzy Hash: 8C2167B1504240DFDF05DF10C9C4B26BF61FB88328F21C569E8066B246C336D956CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285453337.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_cad000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da82b78db05588de6b75f9654cfb56f2dcfd832a734c4bc0b1ea2e00da383df3
                                      • Instruction ID: 2df231e321a0ecb39789112cf2f8a0745fcd5aa6355a9047f40460239f35ee1b
                                      • Opcode Fuzzy Hash: da82b78db05588de6b75f9654cfb56f2dcfd832a734c4bc0b1ea2e00da383df3
                                      • Instruction Fuzzy Hash: B62107B5608345DFDB14CF10D9C0B26BB65FB89318F24C569D94B4B646C336D847CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285453337.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_cad000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e937fef05ca4cdcf7543f750cbb0d1f98b2c0fe33c1b8a7622ab15c00645dedf
                                      • Instruction ID: 6e8e9b1094ad7cd6d103049c6799a3a3815a271df6f014081eaf6064f9b694ce
                                      • Opcode Fuzzy Hash: e937fef05ca4cdcf7543f750cbb0d1f98b2c0fe33c1b8a7622ab15c00645dedf
                                      • Instruction Fuzzy Hash: 922137B1508345EFDB04CF10C9C0B26BB61FB89318F20C6ADE90B4B642C336DC46CA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285453337.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_cad000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca447bd6af6861ac124462fe64e5bd49fe4195cb5b85a40ef86026543196c521
                                      • Instruction ID: a4e4688750e66eeac4acb1513033b8a7eb033ae8ef1447945cc56c69785da8b8
                                      • Opcode Fuzzy Hash: ca447bd6af6861ac124462fe64e5bd49fe4195cb5b85a40ef86026543196c521
                                      • Instruction Fuzzy Hash: F32180755093C08FCB02CF20D990715BF71EB46314F28C5EAD84A8F6A7C33A990ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285416939.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c9d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4e0ce4394a271259760c2c660e1cb6f29709190ae4859f5a8d1e8115099c26a4
                                      • Instruction ID: 2eac2d2ced10a7b17e569855613d19ae172f782d4bb1dacc6676612df6565418
                                      • Opcode Fuzzy Hash: 4e0ce4394a271259760c2c660e1cb6f29709190ae4859f5a8d1e8115099c26a4
                                      • Instruction Fuzzy Hash: F41108B6504280CFCF15CF10D5C4B16BF71FB94324F24C6A9D8455B656C33AD956CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285453337.0000000000CAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CAD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_cad000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b0c76da7bef37b33f57a9aa67a4505d4f7fa3297620b3ab0aa91aa81e941354
                                      • Instruction ID: 8f0a4e136447cbdaef7fea72c7ca185e80a93d740fedcde2281a32c8e994c972
                                      • Opcode Fuzzy Hash: 7b0c76da7bef37b33f57a9aa67a4505d4f7fa3297620b3ab0aa91aa81e941354
                                      • Instruction Fuzzy Hash: 1B118B75904284DFCB15CF10D5C4B15BBB1FB85328F28C6AAD84A4BA56C33AD94ACB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285416939.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c9d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 15ba9b72aedecf6d056b5de33413f8e6d0aaa88f229d96751c5b902b607ac79c
                                      • Instruction ID: 96323e3a84a320b97cc4f7d3947a8d9020968b38d3add53b5def50e514fbe9ce
                                      • Opcode Fuzzy Hash: 15ba9b72aedecf6d056b5de33413f8e6d0aaa88f229d96751c5b902b607ac79c
                                      • Instruction Fuzzy Hash: 9E012B710083409AEF104E66CCC8B66BBD8DF51774F18C55AED166B28AD3789840C6B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.285416939.0000000000C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C9D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_c9d000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64934b5f02aff3d24c88a5915abcea3fdab5545c26bd61e583f94e3151a5e49d
                                      • Instruction ID: 68f69e745dcf772f69df08919b1116babf99ef26e7a3a5fd55c5f52bda95eacf
                                      • Opcode Fuzzy Hash: 64934b5f02aff3d24c88a5915abcea3fdab5545c26bd61e583f94e3151a5e49d
                                      • Instruction Fuzzy Hash: 3AF0C2714083849EEB108E16CCC8B62FFA8EB91774F18C45AED085B28AD3789C44CAB0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d2adae3ee8a737dcd9aef0d8672fb5d0725151aa3d4c4a40073f7e9d3f849cfc
                                      • Instruction ID: 8dc74d70f324aa14b06e732cc45cd605de42572a7bf12a44c262d3d61af9ff45
                                      • Opcode Fuzzy Hash: d2adae3ee8a737dcd9aef0d8672fb5d0725151aa3d4c4a40073f7e9d3f849cfc
                                      • Instruction Fuzzy Hash: 4A12D9F9CD17468AD338CF65E49A1993BA1B744329BD2CA09D1622EAD0D7BC017ECF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b195b6673c500c1911a4f517a123cc3b3dcf7405231f1b17ad11f3dd2ae0c0b8
                                      • Instruction ID: 3c5653ef73860e0a0be58aa3b1a70bc1abfcb3388adfe15e3e6ccc01a9d37803
                                      • Opcode Fuzzy Hash: b195b6673c500c1911a4f517a123cc3b3dcf7405231f1b17ad11f3dd2ae0c0b8
                                      • Instruction Fuzzy Hash: BCA18D32E0061A8FCF05DFB5C8449DEB7F6FF84304B25956AE909BB261EB71A915CB40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.286143057.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_e70000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0285864fca3fd984afe4d457a0ed87fed88ad52557677a1af971cc9f429d70f5
                                      • Instruction ID: 286d9168bf9ecf10eefed8fd8005b5185c68eae5c8da17603d8f02ee1f4b8f9d
                                      • Opcode Fuzzy Hash: 0285864fca3fd984afe4d457a0ed87fed88ad52557677a1af971cc9f429d70f5
                                      • Instruction Fuzzy Hash: C5C13DB9CD17458AD728CF24E8991993BB1BB85328FD2CA09D1626B6D0D7BC107ECF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8acfa1d1dda0699b5a24cc0e4e72642d9b41ea902c66cc78e17257cceb975a0f
                                      • Instruction ID: 3fccf964523728bb3f7abec46fcd54efb5e01f1b2498393f1349e68258e2dc44
                                      • Opcode Fuzzy Hash: 8acfa1d1dda0699b5a24cc0e4e72642d9b41ea902c66cc78e17257cceb975a0f
                                      • Instruction Fuzzy Hash: 00718F71A152548FDB48EFBAE85069EBBF3EFC8304F04C52AD0089B269DF345D058B51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.300678555.00000000070F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_70f0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a71c6b85a202c8a70c6cc7968b4aefc3690089d8df9fbb0addedbcef09e8329
                                      • Instruction ID: bf9bc8e69edd958f76a4a26eae2e61e9d1e6aad6c576863ef302def65e561280
                                      • Opcode Fuzzy Hash: 4a71c6b85a202c8a70c6cc7968b4aefc3690089d8df9fbb0addedbcef09e8329
                                      • Instruction Fuzzy Hash: 66614E71E152588FDB48EFAAE85069EBBF3EFC8304F04C42AD108AB268DF745D058B51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.301978254.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72b0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6aa5b8673c7b8ba4f5bcc3f7a449ec52c3f5a582d405fcf0d8de9069ae3bb308
                                      • Instruction ID: 29a8fe70e3c52161aef74be06f0859665ddcde228e9378c3dca5d194c0cc2cce
                                      • Opcode Fuzzy Hash: 6aa5b8673c7b8ba4f5bcc3f7a449ec52c3f5a582d405fcf0d8de9069ae3bb308
                                      • Instruction Fuzzy Hash: 7E415F71D05A558BEB1DCF6B9D5029AFFF3AFC9201F18C1BA8558AA269EB3005468F01
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000000.00000002.301978254.00000000072B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_72b0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 527074e0e6bc2da9c707b4792d30be97746fde5f76d2c0d04269f0f0d0f0a443
                                      • Instruction ID: 0ae7d17a1e94d67c61dfefc2394f8f207f56a5e411ba75ddfdde2c0fda761332
                                      • Opcode Fuzzy Hash: 527074e0e6bc2da9c707b4792d30be97746fde5f76d2c0d04269f0f0d0f0a443
                                      • Instruction Fuzzy Hash: 584115B1D15A588BEB2CCF6BDD5069EFAF3AFC9301F14D1BA950CAA255EB3005428F01
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:12.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:3.4%
                                      Total number of Nodes:116
                                      Total number of Limit Nodes:11
                                      execution_graph 42558 c4c8c0 42559 c4c8d1 42558->42559 42560 c4c8f4 LdrInitializeThunk 42558->42560 42562 c4c980 42560->42562 42563 10e5248 42564 10e526e 42563->42564 42567 10e3574 42564->42567 42568 10e357f 42567->42568 42569 10e7bf1 42568->42569 42571 10e7be1 42568->42571 42583 10e7780 42569->42583 42572 10e7bef 42571->42572 42575 10e7d08 42571->42575 42579 10e7d18 42571->42579 42577 10e7d0d 42575->42577 42576 10e7780 CallWindowProcW 42576->42577 42577->42576 42578 10e7e0f 42577->42578 42578->42572 42581 10e7d26 42579->42581 42580 10e7780 CallWindowProcW 42580->42581 42581->42580 42582 10e7e0f 42581->42582 42582->42572 42584 10e778b 42583->42584 42585 10e7eda CallWindowProcW 42584->42585 42586 10e7e89 42584->42586 42585->42586 42586->42572 42648 10e6b68 DuplicateHandle 42649 10e6bfe 42648->42649 42650 10e15a8 42651 10e15da 42650->42651 42654 10e1300 42651->42654 42653 10e16ff 42655 10e130b 42654->42655 42659 10e3650 42655->42659 42665 10e3660 42655->42665 42656 10e1c42 42656->42653 42660 10e368a 42659->42660 42671 10e3bd0 42660->42671 42661 10e3708 42662 10e32d8 GetModuleHandleW 42661->42662 42663 10e3731 42661->42663 42662->42663 42666 10e368a 42665->42666 42670 10e3bd0 GetModuleHandleW 42666->42670 42667 10e3708 42668 10e32d8 GetModuleHandleW 42667->42668 42669 10e3731 42667->42669 42668->42669 42669->42669 42670->42667 42672 10e3bd3 42671->42672 42673 10e3c8e 42672->42673 42676 10e3d42 42672->42676 42686 10e3d50 42672->42686 42677 10e3d50 42676->42677 42680 10e3daa 42677->42680 42696 10e32d8 42677->42696 42679 10e3f76 42679->42673 42680->42679 42681 10e32d8 GetModuleHandleW 42680->42681 42682 10e3efb 42681->42682 42682->42679 42683 10e32d8 GetModuleHandleW 42682->42683 42684 10e3f49 42683->42684 42684->42679 42685 10e32d8 GetModuleHandleW 42684->42685 42685->42679 42687 10e3d65 42686->42687 42688 10e32d8 GetModuleHandleW 42687->42688 42689 10e3daa 42687->42689 42688->42689 42690 10e32d8 GetModuleHandleW 42689->42690 42692 10e3f76 42689->42692 42691 10e3efb 42690->42691 42691->42692 42693 10e32d8 GetModuleHandleW 42691->42693 42692->42673 42694 10e3f49 42693->42694 42694->42692 42695 10e32d8 GetModuleHandleW 42694->42695 42695->42692 42697 10e40b0 GetModuleHandleW 42696->42697 42699 10e4125 42697->42699 42699->42680 42587 10e6940 GetCurrentProcess 42588 10e69ba GetCurrentThread 42587->42588 42589 10e69b3 42587->42589 42590 10e69f7 GetCurrentProcess 42588->42590 42591 10e69f0 42588->42591 42589->42588 42594 10e6a2d 42590->42594 42591->42590 42592 10e6a55 GetCurrentThreadId 42593 10e6a86 42592->42593 42594->42592 42595 10eb990 42596 10eb9a4 42595->42596 42599 10ebbda 42596->42599 42605 10ebdbc 42599->42605 42610 10ebcc0 42599->42610 42615 10ebdd6 42599->42615 42620 10ebcbc 42599->42620 42606 10ebd6f 42605->42606 42606->42605 42607 10ebdfb 42606->42607 42625 10ec0b8 42606->42625 42630 10ec109 42606->42630 42611 10ebd04 42610->42611 42612 10ebdfb 42611->42612 42613 10ec0b8 2 API calls 42611->42613 42614 10ec109 2 API calls 42611->42614 42613->42612 42614->42612 42616 10ebde9 42615->42616 42617 10ebdfb 42615->42617 42618 10ec0b8 2 API calls 42616->42618 42619 10ec109 2 API calls 42616->42619 42618->42617 42619->42617 42621 10ebd04 42620->42621 42622 10ebdfb 42621->42622 42623 10ec0b8 2 API calls 42621->42623 42624 10ec109 2 API calls 42621->42624 42623->42622 42624->42622 42626 10ec0d6 42625->42626 42636 10ec118 42626->42636 42640 10ec116 42626->42640 42627 10ec0e6 42627->42607 42631 10ec112 42630->42631 42632 10ec0b2 42630->42632 42631->42607 42634 10ec118 RtlEncodePointer 42632->42634 42635 10ec116 RtlEncodePointer 42632->42635 42633 10ec0e6 42633->42607 42634->42633 42635->42633 42637 10ec152 42636->42637 42638 10ec17c RtlEncodePointer 42637->42638 42639 10ec1a5 42637->42639 42638->42639 42639->42627 42641 10ec152 42640->42641 42642 10ec17c RtlEncodePointer 42641->42642 42643 10ec1a5 42641->42643 42642->42643 42643->42627 42644 10e5090 42645 10e50f8 CreateWindowExW 42644->42645 42647 10e51b4 42645->42647 42647->42647
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: D0Dl$D0Dl$D0Dl
                                      • API String ID: 0-3158727849
                                      • Opcode ID: badf79a45cace951b121de004af9e4cd7ce8dbebc4ae8f0cb2e9016531a907fb
                                      • Instruction ID: 12de63ff164395d482cbf5f0f2e7d156d82e83cf59e5660322d5e29428eeb1e2
                                      • Opcode Fuzzy Hash: badf79a45cace951b121de004af9e4cd7ce8dbebc4ae8f0cb2e9016531a907fb
                                      • Instruction Fuzzy Hash: 37129E71A002299FDB14DF69D844BAEBBF6EF88304F118029E915EB7A5DB34DD41CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3051 c4c8c0-c4c8cf 3052 c4c8f4-c4c97a LdrInitializeThunk 3051->3052 3053 c4c8d1-c4c8db 3051->3053 3065 c4c980-c4c99a 3052->3065 3066 c4cac3-c4cae0 3052->3066 3054 c4c8f0-c4c8f3 3053->3054 3055 c4c8dd-c4c8ee 3053->3055 3055->3054 3065->3066 3069 c4c9a0-c4c9ba 3065->3069 3078 c4cae5-c4caee 3066->3078 3072 c4c9c0 3069->3072 3073 c4c9bc-c4c9be 3069->3073 3075 c4c9c3-c4ca1e 3072->3075 3073->3075 3084 c4ca24 3075->3084 3085 c4ca20-c4ca22 3075->3085 3086 c4ca27-c4cac1 3084->3086 3085->3086 3086->3078
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506688454.0000000000C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c40000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: InitializeThunk
                                      • String ID:
                                      • API String ID: 2994545307-0
                                      • Opcode ID: 1c8d32d7aa527fd35c65be45ece8d1ee5bdaa6fdd7e54902b5d40099ecc27cd1
                                      • Instruction ID: a48e0c0021df3a060c0cb0aa8bab79f0569d4566cd38567073faf1460cc76c6a
                                      • Opcode Fuzzy Hash: 1c8d32d7aa527fd35c65be45ece8d1ee5bdaa6fdd7e54902b5d40099ecc27cd1
                                      • Instruction Fuzzy Hash: 9D518031B043059FCB04EBB4D895AEEB7A6BF85304F148969E505EB391EF74DD048B61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a367465dcd94d137d45271d1b15ca3489357ba6e456adea2a632025d90ee12a
                                      • Instruction ID: 191ad6439980036fc49ae85498a3420a7709ce430c5e136fbf8461e355c0d03e
                                      • Opcode Fuzzy Hash: 2a367465dcd94d137d45271d1b15ca3489357ba6e456adea2a632025d90ee12a
                                      • Instruction Fuzzy Hash: FFA25A30E006298FCB24EF78D85469DB7F2AF89304F1185A9D54AAB761EF309D85CF91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1aaf911277b62b24d408211c39464a07b11c2a33e665ab29c549983377ef07b4
                                      • Instruction ID: 98e2602831c6bae33906deec210bbb8fc8fddedc8ebaf0099a28958a131f313d
                                      • Opcode Fuzzy Hash: 1aaf911277b62b24d408211c39464a07b11c2a33e665ab29c549983377ef07b4
                                      • Instruction Fuzzy Hash: A8026E31A00129EFCB14DFA9E984AADBBF2FF48300F158069E815ABB61D730DD85DB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 010E69A0
                                      • GetCurrentThread.KERNEL32 ref: 010E69DD
                                      • GetCurrentProcess.KERNEL32 ref: 010E6A1A
                                      • GetCurrentThreadId.KERNEL32 ref: 010E6A73
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: f172a954a51a997d161405a338e42426f28bca6e1e97f6d5c377f5c36c52d9e3
                                      • Instruction ID: 1b9d54d140bb29944b8e762123c060f01d415bd71c3afed9bf9d132cc995663b
                                      • Opcode Fuzzy Hash: f172a954a51a997d161405a338e42426f28bca6e1e97f6d5c377f5c36c52d9e3
                                      • Instruction Fuzzy Hash: 785154B0A043488FDB94CFAAD548BEEBBF0EF98314F208459E549A7350D7756844CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1071 c2d938-c2d9a4 call c2aea8 1080 c2dbb0-c2dbba 1071->1080 1081 c2d9aa-c2d9b3 1071->1081 1082 c2dbc0-c2dbe7 1081->1082 1083 c2d9b9-c2d9cb 1081->1083 1088 c2dbe9-c2dbf3 1082->1088 1089 c2dc0c-c2dc37 1082->1089 1086 c2d9d2-c2da14 call c2a720 1083->1086 1087 c2d9cd 1083->1087 1090 c2db9b-c2db9f 1086->1090 1114 c2da1a-c2da53 1086->1114 1087->1090 1091 c2dbf5-c2dc06 1088->1091 1092 c2dc08-c2dc0b 1088->1092 1097 c2dc39-c2dc43 1089->1097 1098 c2dc5c-c2dc8f 1089->1098 1094 c2dba1-c2dbaa 1090->1094 1095 c2dbbb 1090->1095 1091->1092 1094->1080 1094->1081 1095->1082 1100 c2dc45-c2dc56 1097->1100 1101 c2dc58-c2dc5b 1097->1101 1107 c2dc91-c2dca9 1098->1107 1108 c2dcab-c2dcb9 1098->1108 1100->1101 1115 c2dcc0-c2dcd2 call c21830 1107->1115 1108->1115 1114->1095 1151 c2da59-c2da63 1114->1151 1119 c2df52-c2df71 1115->1119 1120 c2dcd8-c2dce6 1115->1120 1124 c2df73-c2df8c 1119->1124 1125 c2df8e-c2dfa1 1119->1125 1127 c2dce8-c2dcef 1120->1127 1128 c2dd3e-c2dd47 1120->1128 1148 c2dfa7-c2dfa8 1124->1148 1125->1148 1131 c2de43-c2de6f 1127->1131 1132 c2dcf5-c2dcfa 1127->1132 1129 c2de76-c2dea2 1128->1129 1130 c2dd4d-c2dd51 1128->1130 1177 c2dea9-c2df13 1129->1177 1134 c2dd62-c2dd7a call c21ff0 1130->1134 1135 c2dd53-c2dd5c 1130->1135 1131->1129 1138 c2dd12-c2dd20 1132->1138 1139 c2dcfc-c2dd02 1132->1139 1147 c2dd7f-c2dd86 1134->1147 1135->1129 1135->1134 1153 c2dd22-c2dd24 1138->1153 1154 c2dd29-c2dd39 1138->1154 1143 c2dd06-c2dd10 1139->1143 1144 c2dd04 1139->1144 1143->1138 1144->1138 1156 c2dda0-c2dda4 1147->1156 1157 c2dd88-c2dd9b call c249b0 1147->1157 1151->1090 1159 c2da69-c2dab9 1151->1159 1162 c2de39-c2de40 1153->1162 1154->1162 1160 c2df1a-c2df4b call c21ff0 1156->1160 1161 c2ddaa-c2ddae 1156->1161 1157->1162 1191 c2daf5-c2daf7 1159->1191 1192 c2dabb-c2dabf 1159->1192 1160->1119 1161->1160 1165 c2ddb4-c2ddbf 1161->1165 1165->1160 1175 c2ddc5-c2ddf1 call c21ff0 1165->1175 1175->1160 1183 c2ddf7-c2de12 call c249b0 1175->1183 1177->1160 1183->1177 1189 c2de18-c2de31 call c25500 1183->1189 1189->1160 1198 c2de37 1189->1198 1194 c2db05 1191->1194 1195 c2daf9-c2db03 1191->1195 1192->1191 1196 c2dac1-c2daf2 1192->1196 1199 c2db0a-c2db0c 1194->1199 1195->1199 1196->1191 1198->1162 1201 c2db6e-c2db8d 1199->1201 1202 c2db0e-c2db10 1199->1202 1201->1095 1214 c2db8f-c2db95 1201->1214 1205 c2db12-c2db1c 1202->1205 1206 c2db1e 1202->1206 1209 c2db23-c2db25 1205->1209 1206->1209 1209->1201 1210 c2db27-c2db2b 1209->1210 1210->1201 1213 c2db2d-c2db67 1210->1213 1213->1201 1214->1090 1214->1159
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XcDl$XcDl
                                      • API String ID: 0-518894161
                                      • Opcode ID: f8192029b75e0dbb695f19d3fa8511f45c45123e05a578d34e7d822feac069f7
                                      • Instruction ID: 267101b5d193d3860101f006baf79d14a42369e510e04b742e2018b4b251e8df
                                      • Opcode Fuzzy Hash: f8192029b75e0dbb695f19d3fa8511f45c45123e05a578d34e7d822feac069f7
                                      • Instruction Fuzzy Hash: 7702CF30B042249FDB14EF68E854BAE7BB2EF98304F158469E506DB791DB70DD42CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2005 c21ac0-c21add 2006 c21ae5-c21ae7 2005->2006 2007 c21adf-c21ae3 2005->2007 2009 c21cf8-c21cff 2006->2009 2007->2006 2008 c21aec-c21af7 2007->2008 2010 c21d00 2008->2010 2011 c21afd-c21b04 2008->2011 2014 c21d05-c21d3d 2010->2014 2012 c21b0a-c21b19 2011->2012 2013 c21c99-c21c9f 2011->2013 2012->2014 2015 c21b1f-c21b2e 2012->2015 2016 c21ca1-c21ca3 2013->2016 2017 c21ca5-c21ca9 2013->2017 2038 c21d46-c21d4a 2014->2038 2039 c21d3f-c21d44 2014->2039 2023 c21b43-c21b46 2015->2023 2024 c21b30-c21b33 2015->2024 2016->2009 2018 c21cf6 2017->2018 2019 c21cab-c21cb1 2017->2019 2018->2009 2019->2010 2021 c21cb3-c21cb6 2019->2021 2021->2010 2025 c21cb8-c21ccd 2021->2025 2027 c21b52-c21b58 2023->2027 2029 c21b48-c21b4b 2023->2029 2024->2027 2028 c21b35-c21b38 2024->2028 2047 c21cf1-c21cf4 2025->2047 2048 c21ccf-c21cd5 2025->2048 2030 c21b70-c21b8d 2027->2030 2031 c21b5a-c21b60 2027->2031 2032 c21c39-c21c3f 2028->2032 2033 c21b3e 2028->2033 2034 c21b9e-c21ba4 2029->2034 2035 c21b4d 2029->2035 2079 c21b96-c21b99 2030->2079 2040 c21b62 2031->2040 2041 c21b64-c21b6e 2031->2041 2042 c21c41-c21c47 2032->2042 2043 c21c57-c21c61 2032->2043 2044 c21c64-c21c71 2033->2044 2045 c21ba6-c21bac 2034->2045 2046 c21bbc-c21bce 2034->2046 2035->2044 2051 c21d50-c21d52 2038->2051 2039->2051 2040->2030 2041->2030 2053 c21c4b-c21c55 2042->2053 2054 c21c49 2042->2054 2043->2044 2065 c21c73-c21c77 2044->2065 2066 c21c85-c21c87 2044->2066 2055 c21bb0-c21bba 2045->2055 2056 c21bae 2045->2056 2068 c21bd0-c21bdc 2046->2068 2069 c21bde-c21c01 2046->2069 2047->2009 2049 c21ce7-c21cea 2048->2049 2050 c21cd7-c21ce5 2048->2050 2049->2010 2057 c21cec-c21cef 2049->2057 2050->2010 2050->2049 2061 c21d67-c21d6e 2051->2061 2062 c21d54-c21d66 2051->2062 2053->2043 2054->2043 2055->2046 2056->2046 2057->2047 2057->2048 2065->2066 2072 c21c79-c21c7d 2065->2072 2074 c21c8b-c21c8e 2066->2074 2080 c21c29-c21c37 2068->2080 2069->2010 2083 c21c07-c21c0a 2069->2083 2072->2010 2075 c21c83 2072->2075 2074->2010 2076 c21c90-c21c93 2074->2076 2075->2074 2076->2012 2076->2013 2079->2044 2080->2044 2083->2010 2084 c21c10-c21c22 2083->2084 2084->2080
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XcDl$XcDl
                                      • API String ID: 0-518894161
                                      • Opcode ID: 7dd8f218aadd58e4aea1be307e4243760c484e71a0a32d2b7b73648e4ed0a2a8
                                      • Instruction ID: ec496fb5bc835f6d86381cd03e5c608e558059fe034e0ebf5f45fc4d9126dd06
                                      • Opcode Fuzzy Hash: 7dd8f218aadd58e4aea1be307e4243760c484e71a0a32d2b7b73648e4ed0a2a8
                                      • Instruction Fuzzy Hash: 5881C179A00125CFCB18CF69E484AAAB7B2FF99341F298069DC12D7B65DB31DD01CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 3103 10e5084-10e50f6 3104 10e50f8-10e50fe 3103->3104 3105 10e5101-10e5108 3103->3105 3104->3105 3106 10e510a-10e5110 3105->3106 3107 10e5113-10e514b 3105->3107 3106->3107 3108 10e5153-10e51b2 CreateWindowExW 3107->3108 3109 10e51bb-10e51f3 3108->3109 3110 10e51b4-10e51ba 3108->3110 3114 10e51f5-10e51f8 3109->3114 3115 10e5200 3109->3115 3110->3109 3114->3115 3116 10e5201 3115->3116 3116->3116
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010E51A2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 08d60e98104400d51a05c86b2bcd02f950e24a9f3dd15bdd2f8c9036b7c127b5
                                      • Instruction ID: 1e72372e0a51e988e8d61d5380af9078d323f85ecdc6c59942402f6391ca67ce
                                      • Opcode Fuzzy Hash: 08d60e98104400d51a05c86b2bcd02f950e24a9f3dd15bdd2f8c9036b7c127b5
                                      • Instruction Fuzzy Hash: 1F51C0B5D003499FDB15CFAAC884ADEBFF1BF88314F24856AE819AB210D7749845CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010E51A2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 54c2bdcb31519fa77a3690dbbfaf905149b8ef93deb1075d3b137f09313b5da0
                                      • Instruction ID: 6aa667bdef5c375747db60d3f7f88711f41361652bc10b2610d82492daa0f802
                                      • Opcode Fuzzy Hash: 54c2bdcb31519fa77a3690dbbfaf905149b8ef93deb1075d3b137f09313b5da0
                                      • Instruction Fuzzy Hash: DA41C0B5D103099FDB14CF9AC884ADEBFF5BF88314F24856AE819AB250D7749845CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 010E7F01
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: CallProcWindow
                                      • String ID:
                                      • API String ID: 2714655100-0
                                      • Opcode ID: ed3067e8a9bb4b742c1c1147b39d05f9d58045a58c5ad665d519b5d099ce3a0f
                                      • Instruction ID: fbabc470146c83c38f3aab1694e6472962dfacafb2689a08ff412726ef1c6e7f
                                      • Opcode Fuzzy Hash: ed3067e8a9bb4b742c1c1147b39d05f9d58045a58c5ad665d519b5d099ce3a0f
                                      • Instruction Fuzzy Hash: 4C413AB4A04315CFCB14CF9AC448AAABBF5FF88314F15C499E559AB321D774A841CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 010E4116
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 8257dda6eb28d813a42559677580e475f8acb00fffd8a22ccb2eebb62e818b34
                                      • Instruction ID: 2916cd7c4e198c44d7d38872bad1ab165f88765556fcd17d89f788fe8eb75b51
                                      • Opcode Fuzzy Hash: 8257dda6eb28d813a42559677580e475f8acb00fffd8a22ccb2eebb62e818b34
                                      • Instruction Fuzzy Hash: 352191B1C093848FCB11CFAAC84469EBFF4EF8A214F15859EC445EB252D3399506CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010E6BEF
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: f098df2e2ff1002a53c64683beb8c4b40531a33c4e4cd9af165b668e178628e1
                                      • Instruction ID: e43c68215a971c9436f07a6e0def61d7076ec8229a180464b1813893a9448464
                                      • Opcode Fuzzy Hash: f098df2e2ff1002a53c64683beb8c4b40531a33c4e4cd9af165b668e178628e1
                                      • Instruction Fuzzy Hash: BB21F2B5900248DFDB10CFAAD984AEEBFF4EF48324F14841AE955A7310D378A945CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010E6BEF
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: f1a1b5618843d7a4a5620fb00cb167be88c1753fb7fd034cb9094fe18982174c
                                      • Instruction ID: 256b44c8e80900b5426bc5327b9f13637b99210c49737311d047b70cba181e6d
                                      • Opcode Fuzzy Hash: f1a1b5618843d7a4a5620fb00cb167be88c1753fb7fd034cb9094fe18982174c
                                      • Instruction Fuzzy Hash: BD21E4B5900248DFDB10CFAAD984AEEBFF4EB48324F14841AE955A3350D374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00F97579,00000800), ref: 00F9760A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509383242.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_f90000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 45f1d0ac9ce7745149e613a9f9cbaa22aaabb0d6c4133a3da368b47fbbccc28f
                                      • Instruction ID: 97087622d12c3253dffae3b8f14b29056dbf2a5e434a0233873dca1ccbaef0ff
                                      • Opcode Fuzzy Hash: 45f1d0ac9ce7745149e613a9f9cbaa22aaabb0d6c4133a3da368b47fbbccc28f
                                      • Instruction Fuzzy Hash: 9D1114B6D043099FDB10DFAAD844BEEFBF4EB88324F15842AD419A7200C374A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RtlEncodePointer.NTDLL(00000000), ref: 010EC192
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: EncodePointer
                                      • String ID:
                                      • API String ID: 2118026453-0
                                      • Opcode ID: 863940b44eca958c86187bd3649bcbfec93664f6c3e04cb480df7db33e3e98c4
                                      • Instruction ID: 7e3bcf0f70fd1e9afc93752e3f4687bc67d2e73450f0d46ad6833aff7a15f8e3
                                      • Opcode Fuzzy Hash: 863940b44eca958c86187bd3649bcbfec93664f6c3e04cb480df7db33e3e98c4
                                      • Instruction Fuzzy Hash: 9F117F71A053198FEB90DFAAC5087EEBFF4FB49714F10846AD445A3641C779A504CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • RtlEncodePointer.NTDLL(00000000), ref: 010EC192
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: EncodePointer
                                      • String ID:
                                      • API String ID: 2118026453-0
                                      • Opcode ID: a0e5a5c38e612fa99b9cfeccf6f0ca734de165b0fed4e87fca5501ee9d75f6e1
                                      • Instruction ID: a47cfb8d409aa5bd10e6a1e3322e9d8fb286fb64d8558a291eceed4b19a79ffe
                                      • Opcode Fuzzy Hash: a0e5a5c38e612fa99b9cfeccf6f0ca734de165b0fed4e87fca5501ee9d75f6e1
                                      • Instruction Fuzzy Hash: 7711AC71A053598FEBA0CFAAC5083EEBFF4FB49314F20846AD449A3241C739A504CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00F97579,00000800), ref: 00F9760A
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509383242.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_f90000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID:
                                      • API String ID: 1029625771-0
                                      • Opcode ID: 2d472bd539107a2de0843fcd452735c7ca6d28a150f89bdde410c788827759d7
                                      • Instruction ID: efd56543f94d32365ad2af5b3ec4c2aeb1d2a59567f3537993635401fbabf74e
                                      • Opcode Fuzzy Hash: 2d472bd539107a2de0843fcd452735c7ca6d28a150f89bdde410c788827759d7
                                      • Instruction Fuzzy Hash: C41112B6D043499FDB10CFAAD844BEEFBF4AB88324F15842ED415A7200C3B4A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 010E4116
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509560405.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_10e0000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: d0ecb5538c282fa5b61ee678be35ded3188ffd8dbd2cc97be1726c056171432a
                                      • Instruction ID: 7c8e855390d6e70c28534c58d679f9805adf3a1df0b226ae5edeb4d3e85b6a29
                                      • Opcode Fuzzy Hash: d0ecb5538c282fa5b61ee678be35ded3188ffd8dbd2cc97be1726c056171432a
                                      • Instruction Fuzzy Hash: D31102B6D046498FDB20CF9AD448BDEFFF4EB88224F11846AD959B7200D378A545CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 00F9AF25
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509383242.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_f90000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: 054f12867b79cab56cd7326bca32378171b072273a9735d7a153a76208aba4e8
                                      • Instruction ID: d6081b933984b20f012dad019c8e492bc3b6f9e9777f0750e465e0496bc732c8
                                      • Opcode Fuzzy Hash: 054f12867b79cab56cd7326bca32378171b072273a9735d7a153a76208aba4e8
                                      • Instruction Fuzzy Hash: 021115B1904748CFDB10DF9AD448BDEBBF4EB48368F248419E519A7600D374A944CFE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 00F9AF25
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.509383242.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_f90000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: a0695f7d5bca9586f98948ba4ca6fa6511e1c96665b877e6a432b8cd191e6f03
                                      • Instruction ID: fbd559550447a372187cb8349fae677f3d0f13bd02e03859573b6136effef4a9
                                      • Opcode Fuzzy Hash: a0695f7d5bca9586f98948ba4ca6fa6511e1c96665b877e6a432b8cd191e6f03
                                      • Instruction Fuzzy Hash: D01127B5D04248CFCB10CFA9D448BDEBFF4EB48368F14841AD419A7640C374A944CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: P@tk
                                      • API String ID: 0-199252316
                                      • Opcode ID: 24c50c222a6e249c95cd5498b21cfddc7eb74458535af3279112fc56aa518815
                                      • Instruction ID: e92bb90ff5b5376b1f0b869f2dab8d14f172a56e5855103a68b3fbf06a855cb7
                                      • Opcode Fuzzy Hash: 24c50c222a6e249c95cd5498b21cfddc7eb74458535af3279112fc56aa518815
                                      • Instruction Fuzzy Hash: A231E171B002158FCB04AF74E8146AFBBF2EF89344B148469D40AEB7A5DF349D46CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: P@tk
                                      • API String ID: 0-199252316
                                      • Opcode ID: c02885b4ef5d9f7fef7c16eda33566f67adbee40ebd7a78efc4e637056fa2a14
                                      • Instruction ID: 371565a2ff588a14a8753468227e2c8c1eafd969afe810946c9a9451b4905d38
                                      • Opcode Fuzzy Hash: c02885b4ef5d9f7fef7c16eda33566f67adbee40ebd7a78efc4e637056fa2a14
                                      • Instruction Fuzzy Hash: AB31BE71B042158FCB04AF74D8146AEBBF6EF89344B148469D40AEB7A4DF349D068BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XcDl
                                      • API String ID: 0-3044878938
                                      • Opcode ID: aa6d29b19c33cd345b1417cee7f5d3d1aba0ddeb90df9a6f88b63d5875aba712
                                      • Instruction ID: 31f24374c02146d82e9d24d3c50fe57f056bf3deddfac1c64d2a33a9bb2382e5
                                      • Opcode Fuzzy Hash: aa6d29b19c33cd345b1417cee7f5d3d1aba0ddeb90df9a6f88b63d5875aba712
                                      • Instruction Fuzzy Hash: 3011C231B005248FDB14EE29E448B69B7A2EBE4721F248525E92B8B740DB70ED41CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7163d15699ad3cba0e45d4d86b7dcbc53e7ce6773a7eb6a5de0820837be7133b
                                      • Instruction ID: fd52ac2e206a37dc788cd94f81ab1c626c7f50b018553b7a1a95f07dec541085
                                      • Opcode Fuzzy Hash: 7163d15699ad3cba0e45d4d86b7dcbc53e7ce6773a7eb6a5de0820837be7133b
                                      • Instruction Fuzzy Hash: C1427C30A002248FDB24DF68E5886ADB7F2FF49314F148869E41ADBB95DB35DD86CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46ed873671b98faf7b89792468f4795be91fe0f1d8d5a397ec23442b8cec517e
                                      • Instruction ID: 3fe4b3005565620b7f78832ccd9bcf4289f84c385f39180d209cde37833a2d19
                                      • Opcode Fuzzy Hash: 46ed873671b98faf7b89792468f4795be91fe0f1d8d5a397ec23442b8cec517e
                                      • Instruction Fuzzy Hash: E912DC30B043198FDB14AB74E8586AE7BF2AF85304F148479E54ADB7A6EB74CD06CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bc731199f036971d46b07fa8a58fb6961b4d5b6b3d56847f5d5bf33cb205f72b
                                      • Instruction ID: dda6b4d6febb86af0e7ea977c392b00436cad7a36ba802c28e5b47521a27304c
                                      • Opcode Fuzzy Hash: bc731199f036971d46b07fa8a58fb6961b4d5b6b3d56847f5d5bf33cb205f72b
                                      • Instruction Fuzzy Hash: 1E228174A002148FCF14EFB8E8446ADBBB2FF89305F118569E509EB7A4DB349D46CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1577a76767ab17502287ce9631ae0261f15e19ef1cfb499c147ce831790bcea2
                                      • Instruction ID: 8fb84903d782c0c7fd36c9e273d18bf7272362e3246fcfc45da4536cc3416ead
                                      • Opcode Fuzzy Hash: 1577a76767ab17502287ce9631ae0261f15e19ef1cfb499c147ce831790bcea2
                                      • Instruction Fuzzy Hash: 3B226C30A00269DFCB14CF69E884A9EBBF2FF48314F158559E955DBAA1CB34EE41CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f02405226b42e7bab701059a1a865c1f4a69118e81a61df010a61c6d87275aa7
                                      • Instruction ID: d6a94df4b896577e77967dd12f670af94467cc611c6ac1bc916db33463b0b2dc
                                      • Opcode Fuzzy Hash: f02405226b42e7bab701059a1a865c1f4a69118e81a61df010a61c6d87275aa7
                                      • Instruction Fuzzy Hash: 22028A74A00165DFCB14CF68E588AAEBBF2FF88300F258555F4199B6A1C738EE41CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da3adf3757d11344d627337c945902e3d634959d0e6aed0d49bc4d8be2c29928
                                      • Instruction ID: 9f5ceea2635574156fb1b692cfc06f3f84912266b9f6d0673c1ed99f370d5a7b
                                      • Opcode Fuzzy Hash: da3adf3757d11344d627337c945902e3d634959d0e6aed0d49bc4d8be2c29928
                                      • Instruction Fuzzy Hash: E4E1B170B0D3954FD712973898557AA7FF29B96304F1A80F6D588CB693EB38DC0A8712
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6557e22169b6b1d7b0b60e32c38fd46f648354d6576e5693a16ea5a5d0e65ff
                                      • Instruction ID: 872493b5366910735f9c72636755202988eea5570b83cdc2c00d3543fbf18516
                                      • Opcode Fuzzy Hash: a6557e22169b6b1d7b0b60e32c38fd46f648354d6576e5693a16ea5a5d0e65ff
                                      • Instruction Fuzzy Hash: ECE15A70A00620CFC724EB68E5996ADB7F2FF88315F148869E41ADBB90DB35ED45CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22a06533ca2e51399d66c5f347eb994499d11a185d488b550d84d31243c41daa
                                      • Instruction ID: b51e7dcd631b271e3e17cb9ebae20228224468c6215009b1561e4b1a575b3fb8
                                      • Opcode Fuzzy Hash: 22a06533ca2e51399d66c5f347eb994499d11a185d488b550d84d31243c41daa
                                      • Instruction Fuzzy Hash: 1DD10976A00524CFCB18CFA9E584DADBBF6BF88311F1680A9E515AB761CB70EC41CB54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4b0604922baae2e254ec912090f95839f4ef77a93711ac1dd383e4e51fd907c
                                      • Instruction ID: fbd79c516f0223e5c6a855baa7a74344151b14b615b39083c75fa3b73e1d7739
                                      • Opcode Fuzzy Hash: d4b0604922baae2e254ec912090f95839f4ef77a93711ac1dd383e4e51fd907c
                                      • Instruction Fuzzy Hash: 0EC1E971E006288FCB18CFA9E58499DBBF6BF88311F168095E515AB761DB30ED42CB64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7146090babbe31afd03a56024c4d4625864425fd0aa901d748090726e83a64d5
                                      • Instruction ID: 4da59fac1815c069a04f929648a5df7fe3f2519960d14c567755942cf48b75fb
                                      • Opcode Fuzzy Hash: 7146090babbe31afd03a56024c4d4625864425fd0aa901d748090726e83a64d5
                                      • Instruction Fuzzy Hash: 4BC17A30A002699FCB14CFA9E984A9EBBF2FF48304F158559E855EB761D734EE41CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: be59c01196c79c3e6ea134e08f47cc24b4bed4c0f0555c7d8b3ecd9066b9983d
                                      • Instruction ID: f1fbcff35fd03055845868f6e0653e5b8a30e3ae144c14672bb9ee8ef2ffc17f
                                      • Opcode Fuzzy Hash: be59c01196c79c3e6ea134e08f47cc24b4bed4c0f0555c7d8b3ecd9066b9983d
                                      • Instruction Fuzzy Hash: 81919F30A003198FDB14EFB4E8556ADBBF2EF89304B148869D906EB794DF349D46CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17e40d9c89b799b2e4c2f14ad939fa7870f8d85171279f25baf2700244851878
                                      • Instruction ID: 5caa548aa8f8a4e0c03e865211fcffe59c611ff3252308f0faa7ae9e3ff4d587
                                      • Opcode Fuzzy Hash: 17e40d9c89b799b2e4c2f14ad939fa7870f8d85171279f25baf2700244851878
                                      • Instruction Fuzzy Hash: A77143317042208FDB58AB29D49473E77E2AFD9344F198429E946CB795DF31DD42C790
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03ad006538c90d32cb064901c2f5e8191c7772c61f26d28000ec6a3b8d61a1cf
                                      • Instruction ID: 6bd1be0f46e86d72682de0bb4b42e06028543bdd58debda1c0bb2e2bbee9dcdd
                                      • Opcode Fuzzy Hash: 03ad006538c90d32cb064901c2f5e8191c7772c61f26d28000ec6a3b8d61a1cf
                                      • Instruction Fuzzy Hash: 3151E2347141A58FCB14DF3EE884A6ABBE9FF48700B1540AAE916CB761DB39DE01CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 18a251a74812c43e4f6ceb6b99ebaafc5cfd96fe113e095a4745b8820911a68b
                                      • Instruction ID: 09c00c6f4070398183d330f4f7790470cb68d5a4d3b90a0b371091c91864bcff
                                      • Opcode Fuzzy Hash: 18a251a74812c43e4f6ceb6b99ebaafc5cfd96fe113e095a4745b8820911a68b
                                      • Instruction Fuzzy Hash: C4512570E093598FCB01EBB8D9456AEBFF2AF55300F1584AAD108EB683E7349D05C791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3509f5c53e07b1c68ab31f5da2a620085c2079e05c1c83d8c273a3810bae9eea
                                      • Instruction ID: 1d3662c0649ddc5c5c3e1b43e0d893803401deaad70ff4c7ec16424dcbfadf6a
                                      • Opcode Fuzzy Hash: 3509f5c53e07b1c68ab31f5da2a620085c2079e05c1c83d8c273a3810bae9eea
                                      • Instruction Fuzzy Hash: 1D51C978E003188FCF50EFA8D88559DBBB5FF5A305B508965D809E77A8EB345906CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93678e7805227c360f1e1c105f65788f45c8b0e9575928dbecefe89bca772d9f
                                      • Instruction ID: da370b95870719a712caf3c21952ea712ac0d574c7a60241c97db19c40d71a93
                                      • Opcode Fuzzy Hash: 93678e7805227c360f1e1c105f65788f45c8b0e9575928dbecefe89bca772d9f
                                      • Instruction Fuzzy Hash: C041BC356082249FDB568F24E844BAA7BF2EBC8704F198418E906CB790DB74CD11CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 11d75a6c3f1669f4161ecc80f4779b18e3d92bc0bbb48e56c4deb601c2f192cf
                                      • Instruction ID: 57314240bd2133942d385459f8eea07c13df89f3cf221f80aa0eb68d523f88c6
                                      • Opcode Fuzzy Hash: 11d75a6c3f1669f4161ecc80f4779b18e3d92bc0bbb48e56c4deb601c2f192cf
                                      • Instruction Fuzzy Hash: 57412C74E002289BDB54EF79D895BDEB7F6EF89300F0044A9E509AB380DB319E418F50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab84b482b6579d7ba0bb032f0a226c2e3a934c747a926e520fd782ac40baa7d6
                                      • Instruction ID: 373f253287b32855baddfbc941aae2c5464a824c8b2b480c14bf43b2df4faf7f
                                      • Opcode Fuzzy Hash: ab84b482b6579d7ba0bb032f0a226c2e3a934c747a926e520fd782ac40baa7d6
                                      • Instruction Fuzzy Hash: EA414B747001598FCB14AF69E888BAA7BB5FF89315F100069F9168B370CB75DE81CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36c9ea34cdedfe6e7c30e29d4e44b673d64f8394cae6c42c624fd6085a826931
                                      • Instruction ID: e995a866ab16c7d623de1ed81bf14dd6b2e998953935f4de79add55bcc04d7c3
                                      • Opcode Fuzzy Hash: 36c9ea34cdedfe6e7c30e29d4e44b673d64f8394cae6c42c624fd6085a826931
                                      • Instruction Fuzzy Hash: E941D931700219DFCF459F59E854ABE7BE6EFA8300F088065FE1A87251DB35CE629B50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c4f8b0df6d928b213d6293cf14ee72ac2655ea503c709a5c05fc31f609e9fb66
                                      • Instruction ID: 619dae703b003a6d0b5f8444c8f2ac8c6982f183418efeda70dd915225363f1d
                                      • Opcode Fuzzy Hash: c4f8b0df6d928b213d6293cf14ee72ac2655ea503c709a5c05fc31f609e9fb66
                                      • Instruction Fuzzy Hash: 0A31EF31B442149FDB48AB68D854BAE7BB6EFC8310F154069E60AEB391CF309C15CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 74f9c02049ef1a0714828ed19dd3929499b6a86abb6928b8499fc1cd140eab6f
                                      • Instruction ID: 4197aa6a3b2441b4bfe710a173c72ea8aba846b0b372fab84fda63b42ea61f85
                                      • Opcode Fuzzy Hash: 74f9c02049ef1a0714828ed19dd3929499b6a86abb6928b8499fc1cd140eab6f
                                      • Instruction Fuzzy Hash: AF2129323143694BDB152735A89427E3B9B9FC5718F194039DA12DFB94DE2DCE029782
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41e487b54ca85d98427db9c8b6126a2723efd6c530590f2b85316191ac6c704f
                                      • Instruction ID: 45e3d0d7ad71c3645bb19e95e99376c747db68bf454d16ad0a717f241366e74f
                                      • Opcode Fuzzy Hash: 41e487b54ca85d98427db9c8b6126a2723efd6c530590f2b85316191ac6c704f
                                      • Instruction Fuzzy Hash: 7621F6313143684BEF156625E49477E3A9BDFC4718F258039DA12CFB94DE2DCE429782
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d73a2dfe0e8967077b6a6fd91af76a2962c350844576615ca063fe52ac228e81
                                      • Instruction ID: 42191e7404c2e389b874e33821f60a6ee211efdbde141593148eb54abdf6465c
                                      • Opcode Fuzzy Hash: d73a2dfe0e8967077b6a6fd91af76a2962c350844576615ca063fe52ac228e81
                                      • Instruction Fuzzy Hash: A221B1317042A98FDB04CE26FC8066B7BEAEB85310F154626E912DB654DB39CF01DBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 761ab06d3e2f67568354cf8c8071bc9e4caac9042ee35272589b25a463be4e14
                                      • Instruction ID: 81569e9c5077c149997268018b266fb3a02a5f6d35d409e7f2f318008d96fe0c
                                      • Opcode Fuzzy Hash: 761ab06d3e2f67568354cf8c8071bc9e4caac9042ee35272589b25a463be4e14
                                      • Instruction Fuzzy Hash: 1721B334B042288FCB41EB7CE845AAE77F6EF89300F158065D50DE7795EB349D068BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: daa93fa9f8e508618e82893ba0d4c210f745477d473863377997af587eb0ca5f
                                      • Instruction ID: cd55aa313431e43a9d3ad105d221b500a01fa1ad89c4eee5a99d792aea60ae99
                                      • Opcode Fuzzy Hash: daa93fa9f8e508618e82893ba0d4c210f745477d473863377997af587eb0ca5f
                                      • Instruction Fuzzy Hash: 3F113A32B042255FDB469E6978106FF3BABCBD8790F1C802AFA15C7280DE31CD128791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0250de1d5daacb190d5310818f0bb4236caeefd542d70e39b870b41f3c1ef2a6
                                      • Instruction ID: 5120737a171ffe62c16782d97e9c77594e12385bb3f64c3e5ae4eb5d64516b54
                                      • Opcode Fuzzy Hash: 0250de1d5daacb190d5310818f0bb4236caeefd542d70e39b870b41f3c1ef2a6
                                      • Instruction Fuzzy Hash: 32113632701621CFC7199A29E85463AB7A6FF99390B1D4479ED06CB750CF30DC02CB80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7fe05914e4cad6dd587a0ab207e11fdaafbfe5dbeae50c8b57876a278826f47c
                                      • Instruction ID: a767e545aba4e8a330c9cc3f83c2b5829bfad8acc8b401487c5b2bf3b247a4d6
                                      • Opcode Fuzzy Hash: 7fe05914e4cad6dd587a0ab207e11fdaafbfe5dbeae50c8b57876a278826f47c
                                      • Instruction Fuzzy Hash: A521AF32900218EFDB20CF54E844BAABBF6EF48310F04856AF5599BA51D775ED58CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6bdc1344f91bd5be41ff5f963b3269bf4b6d0fe905c4138ad1ccfc20a49be016
                                      • Instruction ID: a0da8c22c7f457dd4ffad2e43ead94d18cf4c7aa0584af99db6a380ff60e01fd
                                      • Opcode Fuzzy Hash: 6bdc1344f91bd5be41ff5f963b3269bf4b6d0fe905c4138ad1ccfc20a49be016
                                      • Instruction Fuzzy Hash: C721E3B19042299BCB00CF9AD884BDEFBB4FB48324F10812AE518B7640D374A954CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9fbd9f68e7d69c8a39e4e6dbbe857670ec7bf7630fc5d2b86bf5363acce67ad2
                                      • Instruction ID: fe82a92ed0f7b6c728bbdca4d8ba3d7d39e6ee31cbe36818e0a7cd1d4eb9f0f2
                                      • Opcode Fuzzy Hash: 9fbd9f68e7d69c8a39e4e6dbbe857670ec7bf7630fc5d2b86bf5363acce67ad2
                                      • Instruction Fuzzy Hash: 50111E35F002289F8B50EB7DD8459AEB7F5FF89710B508429E50DE7B54EB349D028BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: adff7f17396cf3130c49b14b46b47410dfe0f9a0758d058734e769db8f67de1e
                                      • Instruction ID: 7f3d0af5f63d0b9a23e9de7865152187d12d8d780eb6aebc12df453422605ac8
                                      • Opcode Fuzzy Hash: adff7f17396cf3130c49b14b46b47410dfe0f9a0758d058734e769db8f67de1e
                                      • Instruction Fuzzy Hash: 02F0A7B6E182555FC750DBB99C092AEBFF8AB89610F0504BED50DD3240EB744A018BD2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebd3f3ac5a0f5344dccc6d6418fd5c72f183e6b2d9f16e5649ea2d0fca46f29d
                                      • Instruction ID: 7230d29b0052da439b9a2c245629e900e1532423bdad2c1ff703aaed27e41ac8
                                      • Opcode Fuzzy Hash: ebd3f3ac5a0f5344dccc6d6418fd5c72f183e6b2d9f16e5649ea2d0fca46f29d
                                      • Instruction Fuzzy Hash: D4E01275E042159F47409BADA8055AE7BF8EB88611B14017AE51DD3300EB7049118BE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 56cc08d9559a0b483b0943f1259075c8fb1d8a1995c865cb578f61f108e73ed5
                                      • Instruction ID: 8e382218825726c8b0d5a883a09d302a3860e836a41145f2d8a57f84e60a76c3
                                      • Opcode Fuzzy Hash: 56cc08d9559a0b483b0943f1259075c8fb1d8a1995c865cb578f61f108e73ed5
                                      • Instruction Fuzzy Hash: C4E0C939B141258F8F45EBBDE8884ED77F5FB88215B004065E64AE7794EE389C02CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6c27eabd4f693aadb136c39b9db469416f60ed72110cc11149a32b41c11bcfe5
                                      • Instruction ID: a25df58e9cedc96fc845d221193047198a96b4e2c9296aa422519792d0a3ed4b
                                      • Opcode Fuzzy Hash: 6c27eabd4f693aadb136c39b9db469416f60ed72110cc11149a32b41c11bcfe5
                                      • Instruction Fuzzy Hash: 32D05E3244C3154ADBD4BBF4E842776375A8BA0208B40CD62F2894926EDAB866474B99
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 545b17dadfa5b58d0d8d4f842d1bd0d136ca21540aee31066172cd9004e4e987
                                      • Instruction ID: 5f29fd7ae66c85fe3bf242b7bd7f0cc5aa83371ecc8cc355a4f7666b331539f7
                                      • Opcode Fuzzy Hash: 545b17dadfa5b58d0d8d4f842d1bd0d136ca21540aee31066172cd9004e4e987
                                      • Instruction Fuzzy Hash: BCD0673AB10118DF9B059F98E8408DDF77AFB98325B058116FA15A7265C6319921DB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9448ba51f991c5e6436ee0afc4852e2f367157eeaf22773abfb4f2c0b2ebfe08
                                      • Instruction ID: c5e28f9f2d78121fbe284edc40c292d9fc6f3b6e311f3c83460db3248f7453c0
                                      • Opcode Fuzzy Hash: 9448ba51f991c5e6436ee0afc4852e2f367157eeaf22773abfb4f2c0b2ebfe08
                                      • Instruction Fuzzy Hash: 8DC0123010C3154A8A94BB75E842926335EDAD0208340CD32E1495917EDF7166064795
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.506332573.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_c20000_SecuriteInfo.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?l$?l$?l$?l
                                      • API String ID: 0-825565553
                                      • Opcode ID: e3f5d91e5c5e6defa9aab0693bf544b30824ec6dcf209fc7cd007cf5ad86a249
                                      • Instruction ID: 868995231d3145476ee75965f04f5248b97268958f0ab3a19142184fbb0227d8
                                      • Opcode Fuzzy Hash: e3f5d91e5c5e6defa9aab0693bf544b30824ec6dcf209fc7cd007cf5ad86a249
                                      • Instruction Fuzzy Hash: 96018839B101258FCB148AAFD14092A73D5BFA9760319417AF931CB770DB70DD42C791
                                      Uniqueness

                                      Uniqueness Score: -1.00%