Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Heur.18737.25106.exe

Overview

General Information

Sample name:SecuriteInfo.com.Heur.18737.25106.exe
Analysis ID:1414901
MD5:256ab4b69efe3560e3589e6d7c0d54d5
SHA1:b138a1744e1030a7bccf18c0d30bef2525be3176
SHA256:d5af1b5ed5eeca90dc835ed26ffc8a8854890eeefa32aacaa094b5d606d4edda
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3282091389.0000000002C1E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x334c3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33535:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x335bf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33651:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x336bb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3372d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x337c3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33853:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 12 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe, Initiated: true, ProcessId: 4256, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49708
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: SecuriteInfo.com.Heur.18737.25106.exeAvira: detected
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                    Source: SecuriteInfo.com.Heur.18737.25106.exeVirustotal: Detection: 48%Perma Link
                    Source: SecuriteInfo.com.Heur.18737.25106.exeReversingLabs: Detection: 39%
                    Source: SecuriteInfo.com.Heur.18737.25106.exeJoe Sandbox ML: detected

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeUnpacked PE file: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.fe0000.0.unpack
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_09BB1320
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_09BB1315
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_09BB1490
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_09BB1490
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then push dword ptr [ebp-20h]0_2_09BB1485
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_09BB1485
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then jmp 09BBEAF4h0_2_09BBE40F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then jmp 09BBEAF4h0_2_09BBE45B
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_09BB17B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_09BB17B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then push dword ptr [ebp-24h]0_2_09BB17A5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh0_2_09BB17A5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then xor edx, edx0_2_09BB16E8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4x nop then xor edx, edx0_2_09BB16DC

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49708 -> 50.87.139.143:587
                    Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: global trafficTCP traffic: 192.168.2.5:49708 -> 50.87.139.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownDNS traffic detected: queries for: mail.elec-qatar.com
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3282091389.0000000002C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000033FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://download.alegsoftware.ga/ws_switches/contatore/ltromatic.ttf
                    Source: SecuriteInfo.com.Heur.18737.25106.exeString found in binary or memory: https://fsf.org/
                    Source: SecuriteInfo.com.Heur.18737.25106.exeString found in binary or memory: https://www.gnu.org/licenses/
                    Source: SecuriteInfo.com.Heur.18737.25106.exeString found in binary or memory: https://www.gnu.org/licenses/why-not-lgpl.html

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, NmHr1WHWKO.cs.Net Code: IiB

                    System Summary

                    barindex
                    Source: 4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E25810_2_016E2581
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E34280_2_016E3428
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E14100_2_016E1410
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E08D10_2_016E08D1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E1B820_2_016E1B82
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E51520_2_016E5152
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E13700_2_016E1370
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E33500_2_016E3350
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E32E90_2_016E32E9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E55080_2_016E5508
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E54F80_2_016E54F8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E57000_2_016E5700
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E57100_2_016E5710
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E59600_2_016E5960
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E59700_2_016E5970
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E5B590_2_016E5B59
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E4E600_2_016E4E60
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E4E500_2_016E4E50
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB39820_2_09BB3982
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB3A280_2_09BB3A28
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB3A1A0_2_09BB3A1A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BBBFF00_2_09BBBFF0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB1E900_2_09BB1E90
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB1E800_2_09BB1E80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB9E390_2_09BB9E39
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BBA2900_2_09BBA290
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB34580_2_09BB3458
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BB34480_2_09BB3448
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BBA6B80_2_09BBA6B8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BBC6A00_2_09BBC6A0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09BBC6910_2_09BBC691
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_09F704480_2_09F70448
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_010C9B304_2_010C9B30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_010C41C84_2_010C41C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_010CD86F4_2_010CD86F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_010C4A984_2_010C4A98
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_010C3E804_2_010C3E80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_060656C84_2_060656C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_06063F404_2_06063F40
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_0606BCF04_2_0606BCF0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_0606DCF84_2_0606DCF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_06069AD04_2_06069AD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_06062AF84_2_06062AF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_06068BFB4_2_06068BFB
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_060600404_2_06060040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_06064FE84_2_06064FE8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 4_2_060632334_2_06063233
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2032614084.00000000018FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000036A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000000.2021917953.00000000010A4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameKawm.exe4 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2041671290.0000000009EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000033FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameriched20.dllp( vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000033FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000033FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $]q,\\StringFileInfo\\000004B0\\OriginalFilename vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3280695547.00000000009B8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameecf3ed1c-5c3b-4038-87a8-401c6c5075d4.exe4 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: SecuriteInfo.com.Heur.18737.25106.exeBinary or memory string: OriginalFilenameKawm.exe4 vs SecuriteInfo.com.Heur.18737.25106.exe
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: riched20.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: usp10.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: msls31.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, qQScs3vgL2JPV0BlNn.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, z2RJpjoL1Xyd4dyirB.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8280000.11.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.3482958.3.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.3463780.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@1/1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Heur.18737.25106.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMutant created: NULL
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Heur.18737.25106.exeVirustotal: Detection: 48%
                    Source: SecuriteInfo.com.Heur.18737.25106.exeReversingLabs: Detection: 39%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeUnpacked PE file: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.fe0000.0.unpack .text:ER;.rsrc:R;.reloc:R; vs Unknown_Section0:ER;Unknown_Section1:R;Unknown_Section2:R;
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeUnpacked PE file: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.fe0000.0.unpack
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, qQScs3vgL2JPV0BlNn.cs.Net Code: FxX4Is5DhD System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, wehuuoKhMKMbnQu72K.cs.Net Code: LOPk5OGwQvvejRfJl7n System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, wehuuoKhMKMbnQu72K.cs.Net Code: LOPk5OGwQvvejRfJl7n System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, qQScs3vgL2JPV0BlNn.cs.Net Code: FxX4Is5DhD System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, qQScs3vgL2JPV0BlNn.cs.Net Code: FxX4Is5DhD System.Reflection.Assembly.Load(byte[])
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: 0xD2E4B502 [Fri Feb 13 10:25:06 2082 UTC]
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_00FE21B7 pushad ; iretd 0_2_00FE21DD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_00FE2545 pushfd ; retf 0_2_00FE2547
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E620B push esi; ret 0_2_016E620E
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E2849 push FFFFFFE9h; retf 0_2_016E2850
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeCode function: 0_2_016E0CD3 push E1FFFFFFh; retf 0_2_016E0CD8
                    Source: SecuriteInfo.com.Heur.18737.25106.exeStatic PE information: section name: .text entropy: 7.82806191300002
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, trBNTD2yCrx784vKDd.csHigh entropy of concatenated method names: 'O1CLktI4rj', 'VdrLqy4nP1', 'Gi336Jc5Ru', 'QbL3dnQB5E', 'vBE39PHVfP', 'VFs3nmICch', 'vyV3Od4dHM', 'adL3elFh2f', 'b5K3gs1XAL', 'Gbk3ML5oPh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, z2RJpjoL1Xyd4dyirB.csHigh entropy of concatenated method names: 'mjSsXTjWVD', 'mu7spvoCRe', 'l6VsmEBt0G', 'j9Os0p8K4J', 'BMkst6XTT4', 'Wass8L7S9o', 'Peps7MFRRm', 'hVysi13Fi4', 'JoQsEjqsrE', 'nmXsU2WT2a'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, piA3pllVerMqfaxNNZ.csHigh entropy of concatenated method names: 'rRcHRGeFa9', 'ND0HsUdOBU', 'kpuHL9jW5v', 'uGPHFowZb4', 'fNtHlkZPaM', 'VvXLtUp44Q', 'QbHL8YTPZ5', 'haAL7rdLl5', 'bXTLiJSdIV', 'i2tLElv7Tw'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, f33TFbwEDEwIrccHJr.csHigh entropy of concatenated method names: 'iybGiZbm26', 'NWAGUncbTD', 'nikZuuPkrP', 'lUQZva9tYf', 'C9rGomj8AR', 'CIaGD1aCsq', 'OQdG2wj30r', 'CgeGXJGYxv', 'cRYGpnVB8d', 'SUeGmLX5HY'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, YpFrJQUAoR7leweN7P.csHigh entropy of concatenated method names: 'WL3wM9S68i', 'A41wD8f7pS', 'apXwXwips1', 'QrtwptSs0Y', 'pt0wYHJ52u', 'Qlpw6672Qa', 'CYkwd8NyJi', 'nKdw9Q7BcB', 'dqtwntJBoZ', 'qpGwOTqKUD'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, GGG2TJZCJaX7vPWbEM.csHigh entropy of concatenated method names: 'RvPfj4LCYc', 'VHhfP1reQ5', 'V8efSgmB7t', 'fa3fY7hZJd', 'lsdfdO3THI', 'Q7Bf9mNc5K', 'qIhfOn0VbY', 'cV7fe8At12', 'E3yfMC8I6a', 'omnfo85Ays'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, ymFk2ohhq6204n10Gb.csHigh entropy of concatenated method names: 'r5KvFxHZQU', 'nkhvlwoyHG', 'ShwvBhB48o', 'sZjvK89Pig', 'ti8vwRc155', 'I7Kvx7qclI', 'OLWhne01q4jweaciDi', 'eXK1I0HAOyqffO175O', 'g2JxdYyWVUsQP3AgGw', 'PO1vvTmR8H'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, RvR29kVv3IvBR5v1Vm.csHigh entropy of concatenated method names: 'Jx2ZCB0GJA', 'lIdZsCPS8i', 'quBZ3xihxO', 'HHqZLogvvs', 'mUhZHOrfvP', 'HNvZFmDqR2', 'z7WZlFD8PK', 'zb6ZaYP3tj', 'OHdZBb23bT', 'kYRZKwGf6k'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, JJb8kXkICK3pIBXBB0.csHigh entropy of concatenated method names: 'pYmrvFuysl', 'MoprJWrUGd', 'DVnr4XJLnH', 'HwCrCSNyJb', 'n6CrsNWmUj', 'nA0rLcLism', 'LTWrHhDAtV', 'v91Z79LMhy', 'lk3ZiGCxOD', 'bobZEHmpZ6'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, qQScs3vgL2JPV0BlNn.csHigh entropy of concatenated method names: 'I4BJRHkLFf', 'espJCkcJKB', 'SxTJsMQMWA', 'vn1J3UXJMk', 'TDgJLHgDXj', 'MDfJHdD8qw', 'ybhJFeyVKY', 'r6WJluVoZJ', 'WvAJaxcUNU', 'HrnJBy3FXF'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, AT9mo5CRrR31EOXuft.csHigh entropy of concatenated method names: 'ajjFQf38Jr', 'DYEF1bc28Y', 'L8CFIBa0Ab', 'guRFWNUsFp', 'DVDFkIia2I', 'WeQFTJKhWv', 'wLiFqR9TW9', 'GQAFjNK0OD', 'PQyFPHvPiX', 'S0hFVhZqMQ'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, YhrWFwjFek2yOMLhRfX.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tPZ5XwdcQE', 'f7c5pFj672', 'oqG5mrggd0', 'N6A503Ipho', 'H9A5ty4RFU', 'jE658UviKO', 'Cjk57EeFIo'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, LCiZcv8cfTBdLr9rRi.csHigh entropy of concatenated method names: 'DnEIT2Fbo', 'xIJWWIYv2', 'hKnTW9wcc', 'VLVqFSFLG', 'qJWPx3s7K', 'KkOVSQgLq', 'aFWJV7dmrjcai55921', 'HgJ01DsMW1uoOm4oXE', 'LlbZi1Kxr', 'QFk51DQb0'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, dHqJ02jqwviMq4WJmrL.csHigh entropy of concatenated method names: 'E1MrQITNWG', 'aqFr19C4Uy', 'q97rIib9tI', 'NNMrWHLLcU', 'NB2rkdTZMO', 'XVkrTXYG7R', 'zmerqLpj4c', 'iSUrjRpnC2', 'ccTrPn82tj', 'K9lrVCilIG'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, KWGj67pSWYgtEm4Htu.csHigh entropy of concatenated method names: 'Dispose', 'WuqvEL6Ib1', 'fm7bYOo8CK', 'FNvAAAZjq3', 'uAhvUi7Tag', 'hGuvz3EmyH', 'ProcessDialogKey', 'MM7buCBvVV', 'J5DbvcMmiM', 'Wl7bbmZM4T'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, hwt56m01NN1EHbZEtx.csHigh entropy of concatenated method names: 'ogMHmNWSVJ', 'kchH0nehqU', 'rGHHtGvE4x', 'ToString', 'wpuH8Sf0Bm', 'Xa0H7vrP3X', 'AiyCAi5fQkKUdLhqPAx', 'lUeont5Y0Ojw5TJ74PV', 'UPaak154kYCUbDZVGkh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, PZg3iXf4RmL1S8LlAY.csHigh entropy of concatenated method names: 'FpfFCNGCOx', 'goYF3r9eR2', 'LyuFHN2e9x', 'i1xHUH8yMP', 'VdIHzogHBG', 'm18Fu0Nnxt', 'TE0Fvm6StH', 'oOgFbNb01V', 'SX7FJpLhT2', 'GqkF43TrUr'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, dtF8SP3TSfjKU2xINg.csHigh entropy of concatenated method names: 'C443WEbYGi', 'r8W3TcGYeJ', 'ioc3jo33ta', 'Qdl3PZLLnJ', 'Wvl3we8mN7', 'nqH3xMEylE', 'hS63GOtTNt', 'Ntq3ZKYPet', 'Nv63r0vx2q', 'n3T35XMI3V'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.9ee0000.12.raw.unpack, EAO5pb4nl8MQbmWoDv.csHigh entropy of concatenated method names: 'POEGBpZ35U', 'CPBGKQGY6J', 'ToString', 'C0OGCbM3Pm', 'RueGs1HihA', 'gnlG33jHbR', 'KEyGLrsQxv', 'rIIGHib5Hg', 'AvQGFeAwCb', 'L0VGlOWyRg'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, kdFvaMFVPKs73pA7Ae.csHigh entropy of concatenated method names: 'jlLbsIppcp4pe', 'HUDVafGQx3A5lYPXEbC', 'bWxlDPGFKtjOUjq8ME9', 'J13JY7Gs9VegMR0Usdn', 'gjnvHYGCPTFBSN5sXDA', 'UXn9pRGVr5JYGFjuCRJ', 'g8bQ3yGYPoLwrRusK3E', 'KwwAwLG5jtFVjgr5V0l', 'lJyLiGG0wAjthymuVo5', 'KrHGd2G9wj507LdZGDe'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, DD.csHigh entropy of concatenated method names: 'wgRxinKHcbWANUbFNm', 'dwveif1E9jqp4XTbTA', 'iYTXHL2SDoNZBJVsGw', 'hFySdn3keDBvJSvKal', 'PVIytPpWpuEYQLk40u'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, ihWImL1h2qjtIkVYDh.csHigh entropy of concatenated method names: 'qJUttacKFT', 'djwp7oGHZ8xfNf3m5ut', 'AZqALCG67UykKuowXP2', 'dkLCJpGlCfFdqtD7Epf', 'iHWSkAGjDuGN31hXJsT', 'u4UYnDGE5xCOMnt15QR', 'jhES7Va4c', 'jWmROKkjL', 'Dispose', 'BJj7gBhfp'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, oImfMJtvGUo8fMQNBQ.csHigh entropy of concatenated method names: 'cxsORewNJ', 'VvrninWuk', 'ustvIxt9o', 'QtXoY7g0N', 'cMKlMbnQu', 'w2KLAB5Xx', 'hNkF6TG2YCh7xU8s3hJ', 'hs4l1PGKtLhAeRnm1c4', 'Dispose', 'MoveNext'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.344e71c.4.raw.unpack, wehuuoKhMKMbnQu72K.csHigh entropy of concatenated method names: 'NXMyxc8eI', 'GTZadPHeP', 'DEVNaDCj9', 'cflmBNqev', 'VFQ0OImLC', 'PbYVMxZvt', 'UPdFjbLed', 'AeEi93ui9', 'oM66buTLn', 'nxFUIfcfn'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, kdFvaMFVPKs73pA7Ae.csHigh entropy of concatenated method names: 'jlLbsIppcp4pe', 'HUDVafGQx3A5lYPXEbC', 'bWxlDPGFKtjOUjq8ME9', 'J13JY7Gs9VegMR0Usdn', 'gjnvHYGCPTFBSN5sXDA', 'UXn9pRGVr5JYGFjuCRJ', 'g8bQ3yGYPoLwrRusK3E', 'KwwAwLG5jtFVjgr5V0l', 'lJyLiGG0wAjthymuVo5', 'KrHGd2G9wj507LdZGDe'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, DD.csHigh entropy of concatenated method names: 'wgRxinKHcbWANUbFNm', 'dwveif1E9jqp4XTbTA', 'iYTXHL2SDoNZBJVsGw', 'hFySdn3keDBvJSvKal', 'PVIytPpWpuEYQLk40u'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, ihWImL1h2qjtIkVYDh.csHigh entropy of concatenated method names: 'qJUttacKFT', 'djwp7oGHZ8xfNf3m5ut', 'AZqALCG67UykKuowXP2', 'dkLCJpGlCfFdqtD7Epf', 'iHWSkAGjDuGN31hXJsT', 'u4UYnDGE5xCOMnt15QR', 'jhES7Va4c', 'jWmROKkjL', 'Dispose', 'BJj7gBhfp'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, oImfMJtvGUo8fMQNBQ.csHigh entropy of concatenated method names: 'cxsORewNJ', 'VvrninWuk', 'ustvIxt9o', 'QtXoY7g0N', 'cMKlMbnQu', 'w2KLAB5Xx', 'hNkF6TG2YCh7xU8s3hJ', 'hs4l1PGKtLhAeRnm1c4', 'Dispose', 'MoveNext'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.8260000.10.raw.unpack, wehuuoKhMKMbnQu72K.csHigh entropy of concatenated method names: 'NXMyxc8eI', 'GTZadPHeP', 'DEVNaDCj9', 'cflmBNqev', 'VFQ0OImLC', 'PbYVMxZvt', 'UPdFjbLed', 'AeEi93ui9', 'oM66buTLn', 'nxFUIfcfn'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, trBNTD2yCrx784vKDd.csHigh entropy of concatenated method names: 'O1CLktI4rj', 'VdrLqy4nP1', 'Gi336Jc5Ru', 'QbL3dnQB5E', 'vBE39PHVfP', 'VFs3nmICch', 'vyV3Od4dHM', 'adL3elFh2f', 'b5K3gs1XAL', 'Gbk3ML5oPh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, z2RJpjoL1Xyd4dyirB.csHigh entropy of concatenated method names: 'mjSsXTjWVD', 'mu7spvoCRe', 'l6VsmEBt0G', 'j9Os0p8K4J', 'BMkst6XTT4', 'Wass8L7S9o', 'Peps7MFRRm', 'hVysi13Fi4', 'JoQsEjqsrE', 'nmXsU2WT2a'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, piA3pllVerMqfaxNNZ.csHigh entropy of concatenated method names: 'rRcHRGeFa9', 'ND0HsUdOBU', 'kpuHL9jW5v', 'uGPHFowZb4', 'fNtHlkZPaM', 'VvXLtUp44Q', 'QbHL8YTPZ5', 'haAL7rdLl5', 'bXTLiJSdIV', 'i2tLElv7Tw'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, f33TFbwEDEwIrccHJr.csHigh entropy of concatenated method names: 'iybGiZbm26', 'NWAGUncbTD', 'nikZuuPkrP', 'lUQZva9tYf', 'C9rGomj8AR', 'CIaGD1aCsq', 'OQdG2wj30r', 'CgeGXJGYxv', 'cRYGpnVB8d', 'SUeGmLX5HY'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, YpFrJQUAoR7leweN7P.csHigh entropy of concatenated method names: 'WL3wM9S68i', 'A41wD8f7pS', 'apXwXwips1', 'QrtwptSs0Y', 'pt0wYHJ52u', 'Qlpw6672Qa', 'CYkwd8NyJi', 'nKdw9Q7BcB', 'dqtwntJBoZ', 'qpGwOTqKUD'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, GGG2TJZCJaX7vPWbEM.csHigh entropy of concatenated method names: 'RvPfj4LCYc', 'VHhfP1reQ5', 'V8efSgmB7t', 'fa3fY7hZJd', 'lsdfdO3THI', 'Q7Bf9mNc5K', 'qIhfOn0VbY', 'cV7fe8At12', 'E3yfMC8I6a', 'omnfo85Ays'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, ymFk2ohhq6204n10Gb.csHigh entropy of concatenated method names: 'r5KvFxHZQU', 'nkhvlwoyHG', 'ShwvBhB48o', 'sZjvK89Pig', 'ti8vwRc155', 'I7Kvx7qclI', 'OLWhne01q4jweaciDi', 'eXK1I0HAOyqffO175O', 'g2JxdYyWVUsQP3AgGw', 'PO1vvTmR8H'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, RvR29kVv3IvBR5v1Vm.csHigh entropy of concatenated method names: 'Jx2ZCB0GJA', 'lIdZsCPS8i', 'quBZ3xihxO', 'HHqZLogvvs', 'mUhZHOrfvP', 'HNvZFmDqR2', 'z7WZlFD8PK', 'zb6ZaYP3tj', 'OHdZBb23bT', 'kYRZKwGf6k'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, JJb8kXkICK3pIBXBB0.csHigh entropy of concatenated method names: 'pYmrvFuysl', 'MoprJWrUGd', 'DVnr4XJLnH', 'HwCrCSNyJb', 'n6CrsNWmUj', 'nA0rLcLism', 'LTWrHhDAtV', 'v91Z79LMhy', 'lk3ZiGCxOD', 'bobZEHmpZ6'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, qQScs3vgL2JPV0BlNn.csHigh entropy of concatenated method names: 'I4BJRHkLFf', 'espJCkcJKB', 'SxTJsMQMWA', 'vn1J3UXJMk', 'TDgJLHgDXj', 'MDfJHdD8qw', 'ybhJFeyVKY', 'r6WJluVoZJ', 'WvAJaxcUNU', 'HrnJBy3FXF'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, AT9mo5CRrR31EOXuft.csHigh entropy of concatenated method names: 'ajjFQf38Jr', 'DYEF1bc28Y', 'L8CFIBa0Ab', 'guRFWNUsFp', 'DVDFkIia2I', 'WeQFTJKhWv', 'wLiFqR9TW9', 'GQAFjNK0OD', 'PQyFPHvPiX', 'S0hFVhZqMQ'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, YhrWFwjFek2yOMLhRfX.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tPZ5XwdcQE', 'f7c5pFj672', 'oqG5mrggd0', 'N6A503Ipho', 'H9A5ty4RFU', 'jE658UviKO', 'Cjk57EeFIo'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, LCiZcv8cfTBdLr9rRi.csHigh entropy of concatenated method names: 'DnEIT2Fbo', 'xIJWWIYv2', 'hKnTW9wcc', 'VLVqFSFLG', 'qJWPx3s7K', 'KkOVSQgLq', 'aFWJV7dmrjcai55921', 'HgJ01DsMW1uoOm4oXE', 'LlbZi1Kxr', 'QFk51DQb0'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, dHqJ02jqwviMq4WJmrL.csHigh entropy of concatenated method names: 'E1MrQITNWG', 'aqFr19C4Uy', 'q97rIib9tI', 'NNMrWHLLcU', 'NB2rkdTZMO', 'XVkrTXYG7R', 'zmerqLpj4c', 'iSUrjRpnC2', 'ccTrPn82tj', 'K9lrVCilIG'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, KWGj67pSWYgtEm4Htu.csHigh entropy of concatenated method names: 'Dispose', 'WuqvEL6Ib1', 'fm7bYOo8CK', 'FNvAAAZjq3', 'uAhvUi7Tag', 'hGuvz3EmyH', 'ProcessDialogKey', 'MM7buCBvVV', 'J5DbvcMmiM', 'Wl7bbmZM4T'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, hwt56m01NN1EHbZEtx.csHigh entropy of concatenated method names: 'ogMHmNWSVJ', 'kchH0nehqU', 'rGHHtGvE4x', 'ToString', 'wpuH8Sf0Bm', 'Xa0H7vrP3X', 'AiyCAi5fQkKUdLhqPAx', 'lUeont5Y0Ojw5TJ74PV', 'UPaak154kYCUbDZVGkh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, PZg3iXf4RmL1S8LlAY.csHigh entropy of concatenated method names: 'FpfFCNGCOx', 'goYF3r9eR2', 'LyuFHN2e9x', 'i1xHUH8yMP', 'VdIHzogHBG', 'm18Fu0Nnxt', 'TE0Fvm6StH', 'oOgFbNb01V', 'SX7FJpLhT2', 'GqkF43TrUr'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, dtF8SP3TSfjKU2xINg.csHigh entropy of concatenated method names: 'C443WEbYGi', 'r8W3TcGYeJ', 'ioc3jo33ta', 'Qdl3PZLLnJ', 'Wvl3we8mN7', 'nqH3xMEylE', 'hS63GOtTNt', 'Ntq3ZKYPet', 'Nv63r0vx2q', 'n3T35XMI3V'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, EAO5pb4nl8MQbmWoDv.csHigh entropy of concatenated method names: 'POEGBpZ35U', 'CPBGKQGY6J', 'ToString', 'C0OGCbM3Pm', 'RueGs1HihA', 'gnlG33jHbR', 'KEyGLrsQxv', 'rIIGHib5Hg', 'AvQGFeAwCb', 'L0VGlOWyRg'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, trBNTD2yCrx784vKDd.csHigh entropy of concatenated method names: 'O1CLktI4rj', 'VdrLqy4nP1', 'Gi336Jc5Ru', 'QbL3dnQB5E', 'vBE39PHVfP', 'VFs3nmICch', 'vyV3Od4dHM', 'adL3elFh2f', 'b5K3gs1XAL', 'Gbk3ML5oPh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, z2RJpjoL1Xyd4dyirB.csHigh entropy of concatenated method names: 'mjSsXTjWVD', 'mu7spvoCRe', 'l6VsmEBt0G', 'j9Os0p8K4J', 'BMkst6XTT4', 'Wass8L7S9o', 'Peps7MFRRm', 'hVysi13Fi4', 'JoQsEjqsrE', 'nmXsU2WT2a'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, piA3pllVerMqfaxNNZ.csHigh entropy of concatenated method names: 'rRcHRGeFa9', 'ND0HsUdOBU', 'kpuHL9jW5v', 'uGPHFowZb4', 'fNtHlkZPaM', 'VvXLtUp44Q', 'QbHL8YTPZ5', 'haAL7rdLl5', 'bXTLiJSdIV', 'i2tLElv7Tw'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, f33TFbwEDEwIrccHJr.csHigh entropy of concatenated method names: 'iybGiZbm26', 'NWAGUncbTD', 'nikZuuPkrP', 'lUQZva9tYf', 'C9rGomj8AR', 'CIaGD1aCsq', 'OQdG2wj30r', 'CgeGXJGYxv', 'cRYGpnVB8d', 'SUeGmLX5HY'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, YpFrJQUAoR7leweN7P.csHigh entropy of concatenated method names: 'WL3wM9S68i', 'A41wD8f7pS', 'apXwXwips1', 'QrtwptSs0Y', 'pt0wYHJ52u', 'Qlpw6672Qa', 'CYkwd8NyJi', 'nKdw9Q7BcB', 'dqtwntJBoZ', 'qpGwOTqKUD'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, GGG2TJZCJaX7vPWbEM.csHigh entropy of concatenated method names: 'RvPfj4LCYc', 'VHhfP1reQ5', 'V8efSgmB7t', 'fa3fY7hZJd', 'lsdfdO3THI', 'Q7Bf9mNc5K', 'qIhfOn0VbY', 'cV7fe8At12', 'E3yfMC8I6a', 'omnfo85Ays'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, ymFk2ohhq6204n10Gb.csHigh entropy of concatenated method names: 'r5KvFxHZQU', 'nkhvlwoyHG', 'ShwvBhB48o', 'sZjvK89Pig', 'ti8vwRc155', 'I7Kvx7qclI', 'OLWhne01q4jweaciDi', 'eXK1I0HAOyqffO175O', 'g2JxdYyWVUsQP3AgGw', 'PO1vvTmR8H'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, RvR29kVv3IvBR5v1Vm.csHigh entropy of concatenated method names: 'Jx2ZCB0GJA', 'lIdZsCPS8i', 'quBZ3xihxO', 'HHqZLogvvs', 'mUhZHOrfvP', 'HNvZFmDqR2', 'z7WZlFD8PK', 'zb6ZaYP3tj', 'OHdZBb23bT', 'kYRZKwGf6k'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, JJb8kXkICK3pIBXBB0.csHigh entropy of concatenated method names: 'pYmrvFuysl', 'MoprJWrUGd', 'DVnr4XJLnH', 'HwCrCSNyJb', 'n6CrsNWmUj', 'nA0rLcLism', 'LTWrHhDAtV', 'v91Z79LMhy', 'lk3ZiGCxOD', 'bobZEHmpZ6'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, qQScs3vgL2JPV0BlNn.csHigh entropy of concatenated method names: 'I4BJRHkLFf', 'espJCkcJKB', 'SxTJsMQMWA', 'vn1J3UXJMk', 'TDgJLHgDXj', 'MDfJHdD8qw', 'ybhJFeyVKY', 'r6WJluVoZJ', 'WvAJaxcUNU', 'HrnJBy3FXF'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, AT9mo5CRrR31EOXuft.csHigh entropy of concatenated method names: 'ajjFQf38Jr', 'DYEF1bc28Y', 'L8CFIBa0Ab', 'guRFWNUsFp', 'DVDFkIia2I', 'WeQFTJKhWv', 'wLiFqR9TW9', 'GQAFjNK0OD', 'PQyFPHvPiX', 'S0hFVhZqMQ'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, YhrWFwjFek2yOMLhRfX.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tPZ5XwdcQE', 'f7c5pFj672', 'oqG5mrggd0', 'N6A503Ipho', 'H9A5ty4RFU', 'jE658UviKO', 'Cjk57EeFIo'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, LCiZcv8cfTBdLr9rRi.csHigh entropy of concatenated method names: 'DnEIT2Fbo', 'xIJWWIYv2', 'hKnTW9wcc', 'VLVqFSFLG', 'qJWPx3s7K', 'KkOVSQgLq', 'aFWJV7dmrjcai55921', 'HgJ01DsMW1uoOm4oXE', 'LlbZi1Kxr', 'QFk51DQb0'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, dHqJ02jqwviMq4WJmrL.csHigh entropy of concatenated method names: 'E1MrQITNWG', 'aqFr19C4Uy', 'q97rIib9tI', 'NNMrWHLLcU', 'NB2rkdTZMO', 'XVkrTXYG7R', 'zmerqLpj4c', 'iSUrjRpnC2', 'ccTrPn82tj', 'K9lrVCilIG'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, KWGj67pSWYgtEm4Htu.csHigh entropy of concatenated method names: 'Dispose', 'WuqvEL6Ib1', 'fm7bYOo8CK', 'FNvAAAZjq3', 'uAhvUi7Tag', 'hGuvz3EmyH', 'ProcessDialogKey', 'MM7buCBvVV', 'J5DbvcMmiM', 'Wl7bbmZM4T'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, hwt56m01NN1EHbZEtx.csHigh entropy of concatenated method names: 'ogMHmNWSVJ', 'kchH0nehqU', 'rGHHtGvE4x', 'ToString', 'wpuH8Sf0Bm', 'Xa0H7vrP3X', 'AiyCAi5fQkKUdLhqPAx', 'lUeont5Y0Ojw5TJ74PV', 'UPaak154kYCUbDZVGkh'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, PZg3iXf4RmL1S8LlAY.csHigh entropy of concatenated method names: 'FpfFCNGCOx', 'goYF3r9eR2', 'LyuFHN2e9x', 'i1xHUH8yMP', 'VdIHzogHBG', 'm18Fu0Nnxt', 'TE0Fvm6StH', 'oOgFbNb01V', 'SX7FJpLhT2', 'GqkF43TrUr'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, dtF8SP3TSfjKU2xINg.csHigh entropy of concatenated method names: 'C443WEbYGi', 'r8W3TcGYeJ', 'ioc3jo33ta', 'Qdl3PZLLnJ', 'Wvl3we8mN7', 'nqH3xMEylE', 'hS63GOtTNt', 'Ntq3ZKYPet', 'Nv63r0vx2q', 'n3T35XMI3V'
                    Source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, EAO5pb4nl8MQbmWoDv.csHigh entropy of concatenated method names: 'POEGBpZ35U', 'CPBGKQGY6J', 'ToString', 'C0OGCbM3Pm', 'RueGs1HihA', 'gnlG33jHbR', 'KEyGLrsQxv', 'rIIGHib5Hg', 'AvQGFeAwCb', 'L0VGlOWyRg'
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 6156, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 16E0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 33F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 53F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 5AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 6AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 6BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 7BF0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: A630000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: B630000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: BAC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: CAC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 1080000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 2BD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWindow / User API: threadDelayed 847Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWindow / User API: threadDelayed 6329Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 6524Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7288Thread sleep count: 847 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7288Thread sleep count: 6329 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -99094s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -98000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -97000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96779s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -96219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe TID: 7276Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99219Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 99094Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98984Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98875Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98765Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 98000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97672Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97218Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97109Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 97000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96890Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96779Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96672Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96547Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96437Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96328Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 96219Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3281121500.0000000000DEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3282091389.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 6156, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 4256, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 6156, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 4256, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 4.2.SecuriteInfo.com.Heur.18737.25106.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.50cdcb0.7.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.4fd5070.8.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Heur.18737.25106.exe.5051690.9.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3282091389.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 6156, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Heur.18737.25106.exe PID: 4256, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    111
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook32
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets141
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
                    Virtualization/Sandbox Evasion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Heur.18737.25106.exe49%VirustotalBrowse
                    SecuriteInfo.com.Heur.18737.25106.exe39%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SecuriteInfo.com.Heur.18737.25106.exe100%AviraHEUR/AGEN.1307581
                    SecuriteInfo.com.Heur.18737.25106.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    mail.elec-qatar.com3%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://download.alegsoftware.ga/ws_switches/contatore/ltromatic.ttf0%Avira URL Cloudsafe
                    http://mail.elec-qatar.com0%Avira URL Cloudsafe
                    http://mail.elec-qatar.com3%VirustotalBrowse
                    https://download.alegsoftware.ga/ws_switches/contatore/ltromatic.ttf0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.elec-qatar.com
                    50.87.139.143
                    truetrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://mail.elec-qatar.comSecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3282091389.0000000002C26000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 3%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    https://account.dyn.com/SecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Heur.18737.25106.exe, 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                      high
                      https://fsf.org/SecuriteInfo.com.Heur.18737.25106.exefalse
                        high
                        https://www.gnu.org/licenses/why-not-lgpl.htmlSecuriteInfo.com.Heur.18737.25106.exefalse
                          high
                          https://download.alegsoftware.ga/ws_switches/contatore/ltromatic.ttfSecuriteInfo.com.Heur.18737.25106.exe, 00000000.00000002.2033191147.00000000033FA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.gnu.org/licenses/SecuriteInfo.com.Heur.18737.25106.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            50.87.139.143
                            mail.elec-qatar.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1414901
                            Start date and time:2024-03-25 09:35:09 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 3s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:7
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:SecuriteInfo.com.Heur.18737.25106.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@5/1@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 98%
                            • Number of executed functions: 46
                            • Number of non-executed functions: 31
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            09:35:58API Interceptor36x Sleep call for process: SecuriteInfo.com.Heur.18737.25106.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            50.87.139.143SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                              NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                  SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                    Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                mail.elec-qatar.comSecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.139.143
                                                NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.139.143
                                                Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.139.143
                                                SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.139.143
                                                Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 50.87.139.143
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                UNIFIEDLAYER-AS-1USSecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.139.143
                                                file.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
                                                • 192.185.16.114
                                                SecuriteInfo.com.Win64.PWSX-gen.371.14469.exeGet hashmaliciousAgentTeslaBrowse
                                                • 192.254.225.136
                                                https://duchessgarden.sn/Get hashmaliciousUnknownBrowse
                                                • 162.241.27.25
                                                DHL STATEMENT OF ACCOUNT - 1003657363.exeGet hashmaliciousAgentTeslaBrowse
                                                • 50.87.195.61
                                                wn1gncGy2T.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
                                                • 192.185.16.114
                                                https://se-sec-cru-sec-rity.linkpc.net/Get hashmaliciousHTMLPhisherBrowse
                                                • 96.125.163.17
                                                https://seeeee-rcurr--cu---ty.linkpc.net/Get hashmaliciousHTMLPhisherBrowse
                                                • 96.125.163.17
                                                phish_alert_sp2_2.0.0.0 (7).emlGet hashmaliciousHTMLPhisherBrowse
                                                • 192.185.189.216
                                                invite.htaGet hashmaliciousUnknownBrowse
                                                • 162.241.169.194
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1216
                                                Entropy (8bit):5.34331486778365
                                                Encrypted:false
                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.820249466806255
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Windows Screen Saver (13104/52) 0.07%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                File name:SecuriteInfo.com.Heur.18737.25106.exe
                                                File size:793'600 bytes
                                                MD5:256ab4b69efe3560e3589e6d7c0d54d5
                                                SHA1:b138a1744e1030a7bccf18c0d30bef2525be3176
                                                SHA256:d5af1b5ed5eeca90dc835ed26ffc8a8854890eeefa32aacaa094b5d606d4edda
                                                SHA512:868d19e9f85eb602af6281f7f48604abb256971df9d72deb381b933cd84039a12fb4158e3ae0227e4c718bf4e2f51adb58e9d305754d70d308c55466aa1381c6
                                                SSDEEP:12288:sAQK1BxgC74CMwbQScLYiDMzBXcU1lBIWyX7tQMwkh4fb2gC4GhgeUns0Q0D93IF:lVbFRvckiozBDDBIWye2gVGhgPns
                                                TLSH:87F4DFAD760072EFC45BCA72DAA92C64F75174B7431BD203A05301ACAA1DA9BCF255F3
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0............../... ...@....@.. ....................................@................................
                                                Icon Hash:00928e8e8686b000
                                                Entrypoint:0x4c2fce
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0xD2E4B502 [Fri Feb 13 10:25:06 2082 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc2f800x4b.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x630.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xc60000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000xc0fd40xc1000b8893752f1113ff59ff70b1e3079d501False0.8670066082415803data7.82806191300002IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0xc40000x6300x80099134aa04a91a5c6ff0a23b3a9df6e95False0.33642578125data3.486962854321601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0xc60000xc0x2004d28466b59bd2b8bc85d243877b86e54False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_VERSION0xc40a00x3a0data0.41810344827586204
                                                RT_MANIFEST0xc44400x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 25, 2024 09:36:02.698775053 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:02.878364086 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:02.878454924 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:03.490273952 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:03.492693901 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:03.672631025 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:03.675710917 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:03.855801105 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:03.856659889 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:04.077027082 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:06.154989004 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:06.155220032 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:06.336791039 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:06.336931944 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:06.336950064 CET5874970850.87.139.143192.168.2.5
                                                Mar 25, 2024 09:36:06.337017059 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:06.342278957 CET49708587192.168.2.550.87.139.143
                                                Mar 25, 2024 09:36:06.521899939 CET5874970850.87.139.143192.168.2.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                Mar 25, 2024 09:36:02.479877949 CET5787453192.168.2.51.1.1.1
                                                Mar 25, 2024 09:36:02.692198038 CET53578741.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Mar 25, 2024 09:36:02.479877949 CET192.168.2.51.1.1.10x8cb7Standard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Mar 25, 2024 09:36:02.692198038 CET1.1.1.1192.168.2.50x8cb7No error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Mar 25, 2024 09:36:03.490273952 CET5874970850.87.139.143192.168.2.5220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Mon, 25 Mar 2024 02:36:03 -0600
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Mar 25, 2024 09:36:03.492693901 CET49708587192.168.2.550.87.139.143EHLO 123716
                                                Mar 25, 2024 09:36:03.672631025 CET5874970850.87.139.143192.168.2.5250-box2248.bluehost.com Hello 123716 [102.165.48.43]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Mar 25, 2024 09:36:03.675710917 CET49708587192.168.2.550.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                                Mar 25, 2024 09:36:03.855801105 CET5874970850.87.139.143192.168.2.5334 UGFzc3dvcmQ6
                                                Mar 25, 2024 09:36:06.154989004 CET5874970850.87.139.143192.168.2.5535 Incorrect authentication data
                                                Mar 25, 2024 09:36:06.155220032 CET49708587192.168.2.550.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                                Mar 25, 2024 09:36:06.336931944 CET5874970850.87.139.143192.168.2.5550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:35:58
                                                Start date:25/03/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                                                Imagebase:0xfe0000
                                                File size:793'600 bytes
                                                MD5 hash:256AB4B69EFE3560E3589E6D7C0D54D5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2033882136.0000000004DCE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:3
                                                Start time:09:35:59
                                                Start date:25/03/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                                                Imagebase:0x230000
                                                File size:793'600 bytes
                                                MD5 hash:256AB4B69EFE3560E3589E6D7C0D54D5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:09:35:59
                                                Start date:25/03/2024
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.18737.25106.exe"
                                                Imagebase:0x760000
                                                File size:793'600 bytes
                                                MD5 hash:256AB4B69EFE3560E3589E6D7C0D54D5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3282091389.0000000002C1E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3280543874.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3282091389.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:12.3%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:191
                                                  Total number of Limit Nodes:20
                                                  execution_graph 18571 9bbee98 18572 9bbf023 18571->18572 18573 9bbeebe 18571->18573 18573->18572 18575 9bb5980 18573->18575 18576 9bbf578 PostMessageW 18575->18576 18577 9bbf625 18576->18577 18577->18573 18563 16ec828 18565 16ec84f 18563->18565 18564 16ec92c 18565->18564 18567 16ec4d0 18565->18567 18568 16edce0 CreateActCtxA 18567->18568 18570 16edde6 18568->18570 18581 9bbd2c6 18586 9bbdbf8 18581->18586 18607 9bbdc6e 18581->18607 18629 9bbdc08 18581->18629 18582 9bbd2d5 18587 9bbdc22 18586->18587 18596 9bbdc2a 18587->18596 18650 9bbe072 18587->18650 18655 9bbdff3 18587->18655 18659 9bbe0fd 18587->18659 18664 9bbe0ba 18587->18664 18671 9bbe1fb 18587->18671 18676 9bbe487 18587->18676 18681 9bbe2c1 18587->18681 18686 9bbe081 18587->18686 18691 9bbe221 18587->18691 18699 9bbe18d 18587->18699 18704 9bbe12f 18587->18704 18709 9bbe58f 18587->18709 18714 9bbe1b4 18587->18714 18719 9bbe875 18587->18719 18728 9bbe137 18587->18728 18733 9bbe5d7 18587->18733 18741 9bbe970 18587->18741 18745 9bbe331 18587->18745 18596->18582 18608 9bbdbfc 18607->18608 18610 9bbdc71 18607->18610 18609 9bbdc2a 18608->18609 18611 9bbe1fb 2 API calls 18608->18611 18612 9bbe0ba 4 API calls 18608->18612 18613 9bbe0fd 2 API calls 18608->18613 18614 9bbdff3 2 API calls 18608->18614 18615 9bbe072 2 API calls 18608->18615 18616 9bbe331 4 API calls 18608->18616 18617 9bbe970 2 API calls 18608->18617 18618 9bbe5d7 4 API calls 18608->18618 18619 9bbe137 2 API calls 18608->18619 18620 9bbe875 4 API calls 18608->18620 18621 9bbe1b4 2 API calls 18608->18621 18622 9bbe58f 2 API calls 18608->18622 18623 9bbe12f 2 API calls 18608->18623 18624 9bbe18d 2 API calls 18608->18624 18625 9bbe221 4 API calls 18608->18625 18626 9bbe081 2 API calls 18608->18626 18627 9bbe2c1 2 API calls 18608->18627 18628 9bbe487 2 API calls 18608->18628 18609->18582 18610->18582 18611->18609 18612->18609 18613->18609 18614->18609 18615->18609 18616->18609 18617->18609 18618->18609 18619->18609 18620->18609 18621->18609 18622->18609 18623->18609 18624->18609 18625->18609 18626->18609 18627->18609 18628->18609 18630 9bbdc22 18629->18630 18631 9bbe1fb 2 API calls 18630->18631 18632 9bbe0ba 4 API calls 18630->18632 18633 9bbe0fd 2 API calls 18630->18633 18634 9bbdff3 2 API calls 18630->18634 18635 9bbe072 2 API calls 18630->18635 18636 9bbe331 4 API calls 18630->18636 18637 9bbe970 2 API calls 18630->18637 18638 9bbe5d7 4 API calls 18630->18638 18639 9bbe137 2 API calls 18630->18639 18640 9bbe875 4 API calls 18630->18640 18641 9bbe1b4 2 API calls 18630->18641 18642 9bbe58f 2 API calls 18630->18642 18643 9bbe12f 2 API calls 18630->18643 18644 9bbe18d 2 API calls 18630->18644 18645 9bbe221 4 API calls 18630->18645 18646 9bbe081 2 API calls 18630->18646 18647 9bbe2c1 2 API calls 18630->18647 18648 9bbdc2a 18630->18648 18649 9bbe487 2 API calls 18630->18649 18631->18648 18632->18648 18633->18648 18634->18648 18635->18648 18636->18648 18637->18648 18638->18648 18639->18648 18640->18648 18641->18648 18642->18648 18643->18648 18644->18648 18645->18648 18646->18648 18647->18648 18648->18582 18649->18648 18651 9bbe068 18650->18651 18652 9bbe07a 18651->18652 18753 9bbc548 18651->18753 18757 9bbc541 18651->18757 18652->18596 18761 9bbcd08 18655->18761 18765 9bbccfc 18655->18765 18661 9bbe068 18659->18661 18660 9bbe07a 18660->18596 18661->18660 18662 9bbc548 WriteProcessMemory 18661->18662 18663 9bbc541 WriteProcessMemory 18661->18663 18662->18661 18663->18661 18769 9bbbec8 18664->18769 18773 9bbbec1 18664->18773 18665 9bbe068 18666 9bbe07a 18665->18666 18667 9bbc548 WriteProcessMemory 18665->18667 18668 9bbc541 WriteProcessMemory 18665->18668 18666->18596 18667->18665 18668->18665 18672 9bbe21e 18671->18672 18674 9bbc548 WriteProcessMemory 18672->18674 18675 9bbc541 WriteProcessMemory 18672->18675 18673 9bbe26e 18673->18596 18674->18673 18675->18673 18678 9bbe068 18676->18678 18677 9bbe07a 18677->18596 18678->18677 18679 9bbc548 WriteProcessMemory 18678->18679 18680 9bbc541 WriteProcessMemory 18678->18680 18679->18678 18680->18678 18682 9bbe266 18681->18682 18683 9bbe26e 18681->18683 18684 9bbc548 WriteProcessMemory 18682->18684 18685 9bbc541 WriteProcessMemory 18682->18685 18683->18596 18684->18683 18685->18683 18687 9bbe0a6 18686->18687 18689 9bbc548 WriteProcessMemory 18687->18689 18690 9bbc541 WriteProcessMemory 18687->18690 18688 9bbe3f0 18688->18596 18689->18688 18690->18688 18693 9bbe227 18691->18693 18692 9bbe07a 18692->18596 18693->18692 18694 9bbe068 18693->18694 18777 9bbbdd8 18693->18777 18781 9bbbdd0 18693->18781 18694->18692 18695 9bbc548 WriteProcessMemory 18694->18695 18696 9bbc541 WriteProcessMemory 18694->18696 18695->18694 18696->18694 18700 9bbe068 18699->18700 18700->18699 18701 9bbe07a 18700->18701 18702 9bbc548 WriteProcessMemory 18700->18702 18703 9bbc541 WriteProcessMemory 18700->18703 18701->18596 18702->18700 18703->18700 18705 9bbe142 18704->18705 18785 9bbcad8 18705->18785 18789 9bbcad0 18705->18789 18706 9bbe164 18710 9bbe068 18709->18710 18711 9bbe07a 18710->18711 18712 9bbc548 WriteProcessMemory 18710->18712 18713 9bbc541 WriteProcessMemory 18710->18713 18711->18596 18712->18710 18713->18710 18716 9bbe068 18714->18716 18715 9bbe07a 18715->18596 18716->18715 18717 9bbc548 WriteProcessMemory 18716->18717 18718 9bbc541 WriteProcessMemory 18716->18718 18717->18716 18718->18716 18720 9bbe882 18719->18720 18721 9bbe238 18719->18721 18721->18719 18722 9bbe07a 18721->18722 18723 9bbe068 18721->18723 18724 9bbbdd8 ResumeThread 18721->18724 18725 9bbbdd0 ResumeThread 18721->18725 18722->18596 18723->18722 18726 9bbc548 WriteProcessMemory 18723->18726 18727 9bbc541 WriteProcessMemory 18723->18727 18724->18721 18725->18721 18726->18723 18727->18723 18729 9bbe8c5 18728->18729 18793 9bbc428 18729->18793 18797 9bbc420 18729->18797 18730 9bbe8e3 18734 9bbe238 18733->18734 18735 9bbe07a 18734->18735 18736 9bbe068 18734->18736 18737 9bbbdd8 ResumeThread 18734->18737 18738 9bbbdd0 ResumeThread 18734->18738 18735->18596 18736->18735 18739 9bbc548 WriteProcessMemory 18736->18739 18740 9bbc541 WriteProcessMemory 18736->18740 18737->18734 18738->18734 18739->18736 18740->18736 18743 9bbbec8 Wow64SetThreadContext 18741->18743 18744 9bbbec1 Wow64SetThreadContext 18741->18744 18742 9bbe98a 18743->18742 18744->18742 18746 9bbe238 18745->18746 18747 9bbe068 18746->18747 18748 9bbe07a 18746->18748 18751 9bbbdd8 ResumeThread 18746->18751 18752 9bbbdd0 ResumeThread 18746->18752 18747->18748 18749 9bbc548 WriteProcessMemory 18747->18749 18750 9bbc541 WriteProcessMemory 18747->18750 18748->18596 18749->18747 18750->18747 18751->18746 18752->18746 18754 9bbc594 WriteProcessMemory 18753->18754 18756 9bbc62d 18754->18756 18756->18651 18758 9bbc594 WriteProcessMemory 18757->18758 18760 9bbc62d 18758->18760 18760->18651 18762 9bbcd8f CreateProcessA 18761->18762 18764 9bbcfe4 18762->18764 18766 9bbcd8f CreateProcessA 18765->18766 18768 9bbcfe4 18766->18768 18770 9bbbf11 Wow64SetThreadContext 18769->18770 18772 9bbbf89 18770->18772 18772->18665 18774 9bbbf11 Wow64SetThreadContext 18773->18774 18776 9bbbf89 18774->18776 18776->18665 18778 9bbbe1c ResumeThread 18777->18778 18780 9bbbe68 18778->18780 18780->18693 18782 9bbbe1c ResumeThread 18781->18782 18784 9bbbe68 18782->18784 18784->18693 18786 9bbcb24 ReadProcessMemory 18785->18786 18788 9bbcb9c 18786->18788 18788->18706 18790 9bbcb24 ReadProcessMemory 18789->18790 18792 9bbcb9c 18790->18792 18792->18706 18794 9bbc46c VirtualAllocEx 18793->18794 18796 9bbc4e4 18794->18796 18796->18730 18798 9bbc46c VirtualAllocEx 18797->18798 18800 9bbc4e4 18798->18800 18800->18730 18578 16e8300 18579 16e834d VirtualProtect 18578->18579 18580 16e83b9 18579->18580 18801 9f71048 FindCloseChangeNotification 18802 9f710cd 18801->18802

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 371 16e32e9-16e32eb 372 16e335e-16e3390 371->372 373 16e32ed-16e3307 371->373 374 16e33bd-16e344d 372->374 375 16e3392-16e33b7 372->375 380 16e331a-16e3321 373->380 381 16e3309-16e3318 373->381 377 16e344f 374->377 378 16e3454-16e3492 call 16e3a08 374->378 375->374 377->378 384 16e3498 378->384 383 16e3328-16e332b 380->383 381->383 383->372 385 16e349f-16e34bb 384->385 386 16e34bd 385->386 387 16e34c4-16e34c5 385->387 386->384 388 16e34ca-16e34d6 386->388 389 16e3807-16e380e 386->389 390 16e374f-16e376f 386->390 391 16e366a-16e3676 386->391 392 16e35ea-16e35f6 386->392 393 16e352b-16e3538 386->393 394 16e37eb-16e3802 386->394 395 16e3708-16e371a 386->395 396 16e35a4-16e35bb 386->396 397 16e35c0-16e35e5 386->397 398 16e37a1-16e37cd 386->398 399 16e361e-16e3627 386->399 400 16e371f-16e3723 386->400 401 16e353d-16e3549 386->401 402 16e36d8-16e36dc 386->402 403 16e3574-16e3578 386->403 404 16e34f4-16e3500 386->404 405 16e3774-16e3780 386->405 406 16e37d2-16e37e6 386->406 407 16e3653-16e3665 386->407 387->388 387->389 412 16e34dd-16e34f2 388->412 413 16e34d8 388->413 390->385 416 16e367d-16e3693 391->416 417 16e3678 391->417 408 16e35fd-16e3619 392->408 409 16e35f8 392->409 393->385 394->385 395->385 396->385 397->385 398->385 414 16e363a-16e3641 399->414 415 16e3629-16e3638 399->415 426 16e3736-16e373d 400->426 427 16e3725-16e3734 400->427 420 16e354b 401->420 421 16e3550-16e356f 401->421 424 16e36de-16e36ed 402->424 425 16e36ef-16e36f6 402->425 422 16e357a-16e3589 403->422 423 16e358b-16e3592 403->423 418 16e3507-16e3526 404->418 419 16e3502 404->419 410 16e3787 405->410 411 16e3782 405->411 406->385 407->385 408->385 409->408 436 16e3791-16e379c 410->436 411->410 412->385 413->412 429 16e3648-16e364e 414->429 415->429 442 16e369a-16e36b0 416->442 443 16e3695 416->443 417->416 418->385 419->418 420->421 421->385 431 16e3599-16e359f 422->431 423->431 432 16e36fd-16e3703 424->432 425->432 433 16e3744-16e374a 426->433 427->433 429->385 431->385 432->385 433->385 436->385 445 16e36b7-16e36d3 442->445 446 16e36b2 442->446 443->442 445->385 446->445
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Ln$Ln
                                                  • API String ID: 0-2613154330
                                                  • Opcode ID: 613555620799ada68943f564ba9917729875ab56c3b7ed369cc67688855acd5e
                                                  • Instruction ID: af640b0e5ffdae910e764f8e6eb312f2daa7349ac28de52d33ea12440bc4c46f
                                                  • Opcode Fuzzy Hash: 613555620799ada68943f564ba9917729875ab56c3b7ed369cc67688855acd5e
                                                  • Instruction Fuzzy Hash: 67F16A74D0620ACFCB15CFA5CA898AEFBF2BF88301B14C659C515AB355D735AA42CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 449 16e3350-16e3390 450 16e33bd-16e344d 449->450 451 16e3392-16e33b7 449->451 453 16e344f 450->453 454 16e3454-16e3492 call 16e3a08 450->454 451->450 453->454 456 16e3498 454->456 457 16e349f-16e34bb 456->457 458 16e34bd 457->458 459 16e34c4-16e34c5 457->459 458->456 460 16e34ca-16e34d6 458->460 461 16e3807-16e380e 458->461 462 16e374f-16e376f 458->462 463 16e366a-16e3676 458->463 464 16e35ea-16e35f6 458->464 465 16e352b-16e3538 458->465 466 16e37eb-16e3802 458->466 467 16e3708-16e371a 458->467 468 16e35a4-16e35bb 458->468 469 16e35c0-16e35e5 458->469 470 16e37a1-16e37cd 458->470 471 16e361e-16e3627 458->471 472 16e371f-16e3723 458->472 473 16e353d-16e3549 458->473 474 16e36d8-16e36dc 458->474 475 16e3574-16e3578 458->475 476 16e34f4-16e3500 458->476 477 16e3774-16e3780 458->477 478 16e37d2-16e37e6 458->478 479 16e3653-16e3665 458->479 459->460 459->461 484 16e34dd-16e34f2 460->484 485 16e34d8 460->485 462->457 488 16e367d-16e3693 463->488 489 16e3678 463->489 480 16e35fd-16e3619 464->480 481 16e35f8 464->481 465->457 466->457 467->457 468->457 469->457 470->457 486 16e363a-16e3641 471->486 487 16e3629-16e3638 471->487 498 16e3736-16e373d 472->498 499 16e3725-16e3734 472->499 492 16e354b 473->492 493 16e3550-16e356f 473->493 496 16e36de-16e36ed 474->496 497 16e36ef-16e36f6 474->497 494 16e357a-16e3589 475->494 495 16e358b-16e3592 475->495 490 16e3507-16e3526 476->490 491 16e3502 476->491 482 16e3787 477->482 483 16e3782 477->483 478->457 479->457 480->457 481->480 508 16e3791-16e379c 482->508 483->482 484->457 485->484 501 16e3648-16e364e 486->501 487->501 514 16e369a-16e36b0 488->514 515 16e3695 488->515 489->488 490->457 491->490 492->493 493->457 503 16e3599-16e359f 494->503 495->503 504 16e36fd-16e3703 496->504 497->504 505 16e3744-16e374a 498->505 499->505 501->457 503->457 504->457 505->457 508->457 517 16e36b7-16e36d3 514->517 518 16e36b2 514->518 515->514 517->457 518->517
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Ln$Ln
                                                  • API String ID: 0-2613154330
                                                  • Opcode ID: 343770c5500b440a9f87747d0593ac6050b3ac74ef9eae3f727f6d6b0db95a05
                                                  • Instruction ID: 782330f6bea476d5a9bf7b4b78247610857280a6c7d41032df1fbd90fd685f0b
                                                  • Opcode Fuzzy Hash: 343770c5500b440a9f87747d0593ac6050b3ac74ef9eae3f727f6d6b0db95a05
                                                  • Instruction Fuzzy Hash: CBE1577490620ACFCB05CFA5CA898AEFBB2BF88301B14C659C515AB355D735EA42CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 521 16e3428-16e344d 522 16e344f 521->522 523 16e3454-16e3492 call 16e3a08 521->523 522->523 525 16e3498 523->525 526 16e349f-16e34bb 525->526 527 16e34bd 526->527 528 16e34c4-16e34c5 526->528 527->525 529 16e34ca-16e34d6 527->529 530 16e3807-16e380e 527->530 531 16e374f-16e376f 527->531 532 16e366a-16e3676 527->532 533 16e35ea-16e35f6 527->533 534 16e352b-16e3538 527->534 535 16e37eb-16e3802 527->535 536 16e3708-16e371a 527->536 537 16e35a4-16e35bb 527->537 538 16e35c0-16e35e5 527->538 539 16e37a1-16e37cd 527->539 540 16e361e-16e3627 527->540 541 16e371f-16e3723 527->541 542 16e353d-16e3549 527->542 543 16e36d8-16e36dc 527->543 544 16e3574-16e3578 527->544 545 16e34f4-16e3500 527->545 546 16e3774-16e3780 527->546 547 16e37d2-16e37e6 527->547 548 16e3653-16e3665 527->548 528->529 528->530 553 16e34dd-16e34f2 529->553 554 16e34d8 529->554 531->526 557 16e367d-16e3693 532->557 558 16e3678 532->558 549 16e35fd-16e3619 533->549 550 16e35f8 533->550 534->526 535->526 536->526 537->526 538->526 539->526 555 16e363a-16e3641 540->555 556 16e3629-16e3638 540->556 567 16e3736-16e373d 541->567 568 16e3725-16e3734 541->568 561 16e354b 542->561 562 16e3550-16e356f 542->562 565 16e36de-16e36ed 543->565 566 16e36ef-16e36f6 543->566 563 16e357a-16e3589 544->563 564 16e358b-16e3592 544->564 559 16e3507-16e3526 545->559 560 16e3502 545->560 551 16e3787 546->551 552 16e3782 546->552 547->526 548->526 549->526 550->549 577 16e3791-16e379c 551->577 552->551 553->526 554->553 570 16e3648-16e364e 555->570 556->570 583 16e369a-16e36b0 557->583 584 16e3695 557->584 558->557 559->526 560->559 561->562 562->526 572 16e3599-16e359f 563->572 564->572 573 16e36fd-16e3703 565->573 566->573 574 16e3744-16e374a 567->574 568->574 570->526 572->526 573->526 574->526 577->526 586 16e36b7-16e36d3 583->586 587 16e36b2 583->587 584->583 586->526 587->586
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Ln$Ln
                                                  • API String ID: 0-2613154330
                                                  • Opcode ID: 3fef4f272b0115f862da4fff966db8ba9dba21f400209b0b8a3ef45eef603ffc
                                                  • Instruction ID: a71561c31602cf9e13c931789ea430813e7a445411473bc494cc4a069104a272
                                                  • Opcode Fuzzy Hash: 3fef4f272b0115f862da4fff966db8ba9dba21f400209b0b8a3ef45eef603ffc
                                                  • Instruction Fuzzy Hash: 08C14774D0221ADFCB05CF99C9898AEFBB2FF88301B149659D515AB354D734EA82CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 590 16e1370-16e1398 591 16e139a-16e13a3 590->591 592 16e13a5-16e13c4 590->592 591->592 593 16e13c6-16e13d3 592->593 594 16e13d5-16e1408 592->594 593->594 595 16e140a-16e142c 594->595 596 16e1433 594->596 595->596 597 16e143a-16e1494 call 16e00e4 596->597 598 16e1435 596->598 603 16e1497 597->603 598->597 604 16e149e-16e14ba 603->604 605 16e14bc 604->605 606 16e14c3-16e14c4 604->606 605->603 607 16e14c9-16e14d1 call 16e1b82 605->607 608 16e1614-16e1684 call 16e00f4 605->608 609 16e151e-16e1533 605->609 610 16e15ad-16e15f3 605->610 611 16e1568-16e15a8 605->611 612 16e15f8-16e160f 605->612 613 16e1538-16e153c 605->613 614 16e14f4-16e151c 605->614 606->607 606->608 621 16e14d7-16e14f2 607->621 631 16e1686 call 16e270e 608->631 632 16e1686 call 16e266c 608->632 633 16e1686 call 16e2a95 608->633 634 16e1686 call 16e2ec2 608->634 635 16e1686 call 16e2581 608->635 609->604 610->604 611->604 612->604 615 16e153e-16e154d 613->615 616 16e154f-16e1556 613->616 614->604 618 16e155d-16e1563 615->618 616->618 618->604 621->604 630 16e168c-16e1696 631->630 632->630 633->630 634->630 635->630
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Te]q$Te]q
                                                  • API String ID: 0-3320153681
                                                  • Opcode ID: 9554ae7e0a393ef62c3d0faa00d5037a72cbbda11ca59fddb1ab92f59ec3e347
                                                  • Instruction ID: 9c77fe74bc842ffd7a77d14a73a8e1e3789ff25f4ef35530385a558f9d6d61d1
                                                  • Opcode Fuzzy Hash: 9554ae7e0a393ef62c3d0faa00d5037a72cbbda11ca59fddb1ab92f59ec3e347
                                                  • Instruction Fuzzy Hash: DDB14474E053098FCB18CFA9C9946AEFBF2FF89310F14852AD815AB324D735A906DB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 637 16e1410-16e1433 639 16e143a-16e1494 call 16e00e4 637->639 640 16e1435 637->640 644 16e1497 639->644 640->639 645 16e149e-16e14ba 644->645 646 16e14bc 645->646 647 16e14c3-16e14c4 645->647 646->644 648 16e14c9-16e14d1 call 16e1b82 646->648 649 16e1614-16e1684 call 16e00f4 646->649 650 16e151e-16e1533 646->650 651 16e15ad-16e15f3 646->651 652 16e1568-16e15a8 646->652 653 16e15f8-16e160f 646->653 654 16e1538-16e153c 646->654 655 16e14f4-16e151c 646->655 647->648 647->649 662 16e14d7-16e14f2 648->662 673 16e1686 call 16e270e 649->673 674 16e1686 call 16e266c 649->674 675 16e1686 call 16e2a95 649->675 676 16e1686 call 16e2ec2 649->676 677 16e1686 call 16e2581 649->677 650->645 651->645 652->645 653->645 656 16e153e-16e154d 654->656 657 16e154f-16e1556 654->657 655->645 659 16e155d-16e1563 656->659 657->659 659->645 662->645 671 16e168c-16e1696 673->671 674->671 675->671 676->671 677->671
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Te]q$Te]q
                                                  • API String ID: 0-3320153681
                                                  • Opcode ID: d7c636ad2e43d45985a79db48321cf95c86290297738196d2625e176221de584
                                                  • Instruction ID: 0a293605946b5814496cca55de0ef2d6c6c726b37b222699113af866219a8765
                                                  • Opcode Fuzzy Hash: d7c636ad2e43d45985a79db48321cf95c86290297738196d2625e176221de584
                                                  • Instruction Fuzzy Hash: 5981B074E01219CFDB08CFA9C994AAEBBF2BF89310F24952AD515BB364D7309906CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041857882.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9f70000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e36e938947656715bb3c75eb82124124b991bf28d8e8aa1cb0d44ee2ecf23c97
                                                  • Instruction ID: 7f9192774ee770b087c6412b12b43450bb8457464080831a382bb69f35f1777a
                                                  • Opcode Fuzzy Hash: e36e938947656715bb3c75eb82124124b991bf28d8e8aa1cb0d44ee2ecf23c97
                                                  • Instruction Fuzzy Hash: C8228A31B013049FDB19DF69C854BAEBBF6AF89300F2844AAE5059B3A4CF75E901CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43d2ebddb6826c9d47899c0dc56a158e99855a16608f6d42ffde5a44c95fccb7
                                                  • Instruction ID: 497029a0914b79fe7a6dab5e906f9f3b23b2e9f5c615fd5cacb52608db4ca6d3
                                                  • Opcode Fuzzy Hash: 43d2ebddb6826c9d47899c0dc56a158e99855a16608f6d42ffde5a44c95fccb7
                                                  • Instruction Fuzzy Hash: 73515B74D052098FCB08CFAAD9446AEFBF2BF89300F14D16AD419AB255D7345A42CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 327954d5893238d799935473d487ab61e70b341acc804894ab621de816381450
                                                  • Instruction ID: 8e537b2ec71dddbcee9227a48f5b6b1954f63d620902ec3f16c15f23f142c2aa
                                                  • Opcode Fuzzy Hash: 327954d5893238d799935473d487ab61e70b341acc804894ab621de816381450
                                                  • Instruction Fuzzy Hash: 5E5128B4D012688FDB24CFA5CD947DDBBF6BF89300F1482AAD409AB254CB345A96CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f90ac03a0a6b926cca788018de40c757f9da4af21e515f0ed3ce57cf677ad93
                                                  • Instruction ID: 6e2ee9bcebf993fd156609f30b4a43f8f35ef78998a7fbc31ede3367454d1d87
                                                  • Opcode Fuzzy Hash: 6f90ac03a0a6b926cca788018de40c757f9da4af21e515f0ed3ce57cf677ad93
                                                  • Instruction Fuzzy Hash: FC41ACB4D05248DFDB10DFA9C584AEEFBF1BB09310F20906AE419BB264D774A944CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a1328d630ad58306a86504237e4646045f8a0d5e37249270464d1b3413628f4
                                                  • Instruction ID: 4e5b4a40813163100cf0408bbbecbab1e294c0928e6e0571a45830b2acd9744f
                                                  • Opcode Fuzzy Hash: 5a1328d630ad58306a86504237e4646045f8a0d5e37249270464d1b3413628f4
                                                  • Instruction Fuzzy Hash: 8C41AAB4D012089FDB10CFA9C584AEEFBF1FB09310F20906AE418BB290D7B4A944CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b1c118182c984ea328a80775d16f6c6057910f4062c141c4c3f33b58a6003678
                                                  • Instruction ID: 214c863061838e247692d20b25a8f51f8fc29823fb8c4331782bb1b3074f82a2
                                                  • Opcode Fuzzy Hash: b1c118182c984ea328a80775d16f6c6057910f4062c141c4c3f33b58a6003678
                                                  • Instruction Fuzzy Hash: 45211D71E056188BEB18CF6BDD4069EFBF7AFC9300F04C1B6C418A6224EB3419468F51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 706 9bbccfc-9bbcda1 708 9bbcdea-9bbce12 706->708 709 9bbcda3-9bbcdba 706->709 712 9bbce58-9bbceae 708->712 713 9bbce14-9bbce28 708->713 709->708 714 9bbcdbc-9bbcdc1 709->714 722 9bbceb0-9bbcec4 712->722 723 9bbcef4-9bbcfe2 CreateProcessA 712->723 713->712 724 9bbce2a-9bbce2f 713->724 715 9bbcdc3-9bbcdcd 714->715 716 9bbcde4-9bbcde7 714->716 717 9bbcdcf 715->717 718 9bbcdd1-9bbcde0 715->718 716->708 717->718 718->718 721 9bbcde2 718->721 721->716 722->723 731 9bbcec6-9bbcecb 722->731 742 9bbcfeb-9bbd0d0 723->742 743 9bbcfe4-9bbcfea 723->743 725 9bbce52-9bbce55 724->725 726 9bbce31-9bbce3b 724->726 725->712 728 9bbce3f-9bbce4e 726->728 729 9bbce3d 726->729 728->728 732 9bbce50 728->732 729->728 734 9bbceee-9bbcef1 731->734 735 9bbcecd-9bbced7 731->735 732->725 734->723 736 9bbcedb-9bbceea 735->736 737 9bbced9 735->737 736->736 739 9bbceec 736->739 737->736 739->734 755 9bbd0d2-9bbd0d6 742->755 756 9bbd0e0-9bbd0e4 742->756 743->742 755->756 759 9bbd0d8 755->759 757 9bbd0e6-9bbd0ea 756->757 758 9bbd0f4-9bbd0f8 756->758 757->758 760 9bbd0ec 757->760 761 9bbd0fa-9bbd0fe 758->761 762 9bbd108-9bbd10c 758->762 759->756 760->758 761->762 763 9bbd100 761->763 764 9bbd10e-9bbd137 762->764 765 9bbd142-9bbd14d 762->765 763->762 764->765 768 9bbd14e 765->768 768->768
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09BBCFCF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 14a3d77a4abfa1fcd685b206915be471baf60c52117ae5415460c4a6a2a0c64f
                                                  • Instruction ID: 81423474c0c704fce11b78eafb3c0764b2f1b57e99120b323b47bbb4d1d07d6f
                                                  • Opcode Fuzzy Hash: 14a3d77a4abfa1fcd685b206915be471baf60c52117ae5415460c4a6a2a0c64f
                                                  • Instruction Fuzzy Hash: FBC11771D002598FDB24CFA8C841BEDBBB1FF49310F0095AAE459B7290DB749A85CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 770 9bbcd08-9bbcda1 772 9bbcdea-9bbce12 770->772 773 9bbcda3-9bbcdba 770->773 776 9bbce58-9bbceae 772->776 777 9bbce14-9bbce28 772->777 773->772 778 9bbcdbc-9bbcdc1 773->778 786 9bbceb0-9bbcec4 776->786 787 9bbcef4-9bbcfe2 CreateProcessA 776->787 777->776 788 9bbce2a-9bbce2f 777->788 779 9bbcdc3-9bbcdcd 778->779 780 9bbcde4-9bbcde7 778->780 781 9bbcdcf 779->781 782 9bbcdd1-9bbcde0 779->782 780->772 781->782 782->782 785 9bbcde2 782->785 785->780 786->787 795 9bbcec6-9bbcecb 786->795 806 9bbcfeb-9bbd0d0 787->806 807 9bbcfe4-9bbcfea 787->807 789 9bbce52-9bbce55 788->789 790 9bbce31-9bbce3b 788->790 789->776 792 9bbce3f-9bbce4e 790->792 793 9bbce3d 790->793 792->792 796 9bbce50 792->796 793->792 798 9bbceee-9bbcef1 795->798 799 9bbcecd-9bbced7 795->799 796->789 798->787 800 9bbcedb-9bbceea 799->800 801 9bbced9 799->801 800->800 803 9bbceec 800->803 801->800 803->798 819 9bbd0d2-9bbd0d6 806->819 820 9bbd0e0-9bbd0e4 806->820 807->806 819->820 823 9bbd0d8 819->823 821 9bbd0e6-9bbd0ea 820->821 822 9bbd0f4-9bbd0f8 820->822 821->822 824 9bbd0ec 821->824 825 9bbd0fa-9bbd0fe 822->825 826 9bbd108-9bbd10c 822->826 823->820 824->822 825->826 827 9bbd100 825->827 828 9bbd10e-9bbd137 826->828 829 9bbd142-9bbd14d 826->829 827->826 828->829 832 9bbd14e 829->832 832->832
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09BBCFCF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID:
                                                  • API String ID: 963392458-0
                                                  • Opcode ID: 0074c04a829297f933e5029e402a3f9058c303405b112d021ccd8633524a4a33
                                                  • Instruction ID: ce0f04300ae15499194c7df90dba1bcc60de414581880887116a527355670881
                                                  • Opcode Fuzzy Hash: 0074c04a829297f933e5029e402a3f9058c303405b112d021ccd8633524a4a33
                                                  • Instruction Fuzzy Hash: 30C11870D002598FDB24CFA8C841BEDBBB1FF49310F0095A9E459B7290DBB49A85CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 834 16ec4d0-16edde4 CreateActCtxA 839 16edded-16ede72 834->839 840 16edde6-16eddec 834->840 849 16ede9f-16edea7 839->849 850 16ede74-16ede97 839->850 840->839 850->849
                                                  APIs
                                                  • CreateActCtxA.KERNEL32(?), ref: 016EDDD1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: e509bc63c5a906e59af11ad9c3ba3cf1478d635b05fac29483867e9c05763eb5
                                                  • Instruction ID: 976946ca4c7fb5bc2583dc51806fd6cbfaa32b3607ff7c347f20fd0b1ed597a7
                                                  • Opcode Fuzzy Hash: e509bc63c5a906e59af11ad9c3ba3cf1478d635b05fac29483867e9c05763eb5
                                                  • Instruction Fuzzy Hash: D551E3B1D00219CFDB20DFA9C944BDEBBF5BF49300F1081AAD509AB251DB756A89CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 854 9bbc541-9bbc5b3 856 9bbc5ca-9bbc62b WriteProcessMemory 854->856 857 9bbc5b5-9bbc5c7 854->857 859 9bbc62d-9bbc633 856->859 860 9bbc634-9bbc686 856->860 857->856 859->860
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09BBC61B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: e1a353759b2d4bc08eab7147448a3f6c7f44bcaeebcbfdebc0517dc78327d3ea
                                                  • Instruction ID: ebf984ef21f285afdc6499f7cb28b51296fbd6db4010719d8f34d088240e4d59
                                                  • Opcode Fuzzy Hash: e1a353759b2d4bc08eab7147448a3f6c7f44bcaeebcbfdebc0517dc78327d3ea
                                                  • Instruction Fuzzy Hash: E8419BB5D012589FCB00CFA9D984AEEFBF1BF49310F24942AE419B7250D778AA45CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 865 9bbc548-9bbc5b3 867 9bbc5ca-9bbc62b WriteProcessMemory 865->867 868 9bbc5b5-9bbc5c7 865->868 870 9bbc62d-9bbc633 867->870 871 9bbc634-9bbc686 867->871 868->867 870->871
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09BBC61B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: be114f8509bf0158ff3f8c7811c644f3563242eb3466f90ceb4a8901bd835ac7
                                                  • Instruction ID: ecdc34fa34aa70f6a4fc1ff1d61c511e3df092fba08222110a4fd2921ff9d22c
                                                  • Opcode Fuzzy Hash: be114f8509bf0158ff3f8c7811c644f3563242eb3466f90ceb4a8901bd835ac7
                                                  • Instruction Fuzzy Hash: 97419BB5D012589FCB00CFA9D984AEEFBF1BF49310F10942AE419B7250D778AA45CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 876 9bbcad0-9bbcb9a ReadProcessMemory 879 9bbcb9c-9bbcba2 876->879 880 9bbcba3-9bbcbf5 876->880 879->880
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09BBCB8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 16efc8b7d9a0f8756f4c7144fb01e52434791e813e04ca907da32a3f924cc9c9
                                                  • Instruction ID: 586e005ce5cbfb79b7b13d7c79edb85c3bb773d33c4d134c546ff57b23669985
                                                  • Opcode Fuzzy Hash: 16efc8b7d9a0f8756f4c7144fb01e52434791e813e04ca907da32a3f924cc9c9
                                                  • Instruction Fuzzy Hash: 0341AAB9D002589FCF10CFA9D984AEEFBB1BF49310F14942AE819B7250D734A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09BBCB8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 7fd44b6b07a0990a8b3a55b2d55998b13e24873539637866acf6b26a321bb9b0
                                                  • Instruction ID: 0d7fb113abff84de663da49506e112a44ae97c815f2d9d1ef81763b443ba738e
                                                  • Opcode Fuzzy Hash: 7fd44b6b07a0990a8b3a55b2d55998b13e24873539637866acf6b26a321bb9b0
                                                  • Instruction Fuzzy Hash: BF41ABB9D002589FCF10CFA9D980AEEFBB1BF09310F10942AE819B7250D775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09BBC4D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 559b72d35d5738d74ccf69eaeb6f9b80677b32bcd7b6399f3fc1aa8f85476144
                                                  • Instruction ID: 864c829aae63c953b4c92ca1882e164f348d2bfa0a7d5f87a6da3a7f7128688f
                                                  • Opcode Fuzzy Hash: 559b72d35d5738d74ccf69eaeb6f9b80677b32bcd7b6399f3fc1aa8f85476144
                                                  • Instruction Fuzzy Hash: 3B3199B8D002589FCF10DFA9D981AEEBBB1BF49310F10942AE815BB250D775A941CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09BBC4D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 1148b52e1f96b6c0b74daf0294a9375888b8738d074fac2285db336cb2315a90
                                                  • Instruction ID: 0a5775a47c275aa21df95d58338434515bc80d9500a5659bae1d107f7f213ceb
                                                  • Opcode Fuzzy Hash: 1148b52e1f96b6c0b74daf0294a9375888b8738d074fac2285db336cb2315a90
                                                  • Instruction Fuzzy Hash: 743188B9D002589FCF10CFA9D980AEEFBB5BF49310F10942AE815BB250D775A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 09BBBF77
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 30049e210cdaa803bd431d496c0157e20f253e52a9419935d8af6152359c7a4a
                                                  • Instruction ID: 501d0d1fdfc467bcbaae4ff8a9dc44dcb5fce1c30b6b447aa1b39381a56604fd
                                                  • Opcode Fuzzy Hash: 30049e210cdaa803bd431d496c0157e20f253e52a9419935d8af6152359c7a4a
                                                  • Instruction Fuzzy Hash: DF41ABB5D012589FCB10DFA9D984AEEBBF1BF49310F24802AE419B7250D778A985CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 016E83A7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 0151b58bb74f2284ba3707289ba83b3b2c223e9b02453084f84e35dbcb74d98d
                                                  • Instruction ID: 48f341a59b810125cc2a6cb22faa2adf7aa6a4010a7734d96592c9504790108d
                                                  • Opcode Fuzzy Hash: 0151b58bb74f2284ba3707289ba83b3b2c223e9b02453084f84e35dbcb74d98d
                                                  • Instruction Fuzzy Hash: DB319AB9D012589FCB10CFA9D584AEEFBF5BF09310F24906AE814B7220D335A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 09BBBF77
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID:
                                                  • API String ID: 983334009-0
                                                  • Opcode ID: 1067d24191115f66565508ef7c6cf6085d9491638474ca57da62761f4ab2e6b4
                                                  • Instruction ID: 50ca627955dda50c817a7d30abd35f26ceafbe8dff9093dc6b5ac816881bf1c0
                                                  • Opcode Fuzzy Hash: 1067d24191115f66565508ef7c6cf6085d9491638474ca57da62761f4ab2e6b4
                                                  • Instruction Fuzzy Hash: A231BBB5D012589FCB10DFAAD984AEEFBF1BF49310F14802AE419B7250D778A985CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 016E83A7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 7f4c6c5f131b64f669660efae60422661708cd87983782af25ed82d9eca44087
                                                  • Instruction ID: 4573b82183a5b057237dc4041748982cf0f6de009d4825988bb5902b18362775
                                                  • Opcode Fuzzy Hash: 7f4c6c5f131b64f669660efae60422661708cd87983782af25ed82d9eca44087
                                                  • Instruction Fuzzy Hash: 513179B9D052589FCB10CFA9D984ADEFBF5BF19310F14902AE818B7220D375A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,00000000), ref: 09BBF613
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 6bf3771c68aced1749cad1cd15c8aefb32ac547b88ed6486f59242b23edc5a41
                                                  • Instruction ID: 3847e584e8cb69830ff14a8787dbd8f8bfbd280f231f877195245ba99f1e1388
                                                  • Opcode Fuzzy Hash: 6bf3771c68aced1749cad1cd15c8aefb32ac547b88ed6486f59242b23edc5a41
                                                  • Instruction Fuzzy Hash: 223199B8D002489FCB10DFA9D984AEEFBF4EB09310F10905AE819BB320D375A945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,00000000), ref: 09BBF613
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 7e4d97e44e2dcfb058acc7fdd56d68f652bda6d5bbabb0455f29498949b964f3
                                                  • Instruction ID: cff08f193c9136fa6d09a0afbc3c112ced78bf7ab457911b9cea88d4fd67db0f
                                                  • Opcode Fuzzy Hash: 7e4d97e44e2dcfb058acc7fdd56d68f652bda6d5bbabb0455f29498949b964f3
                                                  • Instruction Fuzzy Hash: 003177B9D012489FCB10CFA9E984ADEFBF5AB09320F14905AE819BB360D375A945CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • PostMessageW.USER32(?,?,?,00000000), ref: 09BBF613
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: MessagePost
                                                  • String ID:
                                                  • API String ID: 410705778-0
                                                  • Opcode ID: 0ac9b03e22e5e7e0762fb1f7033000f5da3b28988fa6854172e2465c275be316
                                                  • Instruction ID: 70e9bf966444bb15826f913b0f11773223aed17fd51795fadefab828c8cd76e7
                                                  • Opcode Fuzzy Hash: 0ac9b03e22e5e7e0762fb1f7033000f5da3b28988fa6854172e2465c275be316
                                                  • Instruction Fuzzy Hash: 923166B9D052489FCB10CFA9E580AEDFBF1AF19310F24905AE819BB320D375A945CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ResumeThread.KERNELBASE(?), ref: 09BBBE56
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: e640367d2b43159201c02a4dde44dab8324a11bb57030a9d36fc411239c13327
                                                  • Instruction ID: 0daaaae0ffabc1d633a9c45bb637ca3d04ea37270f6c1d78ccaa0d0dbb0c5e58
                                                  • Opcode Fuzzy Hash: e640367d2b43159201c02a4dde44dab8324a11bb57030a9d36fc411239c13327
                                                  • Instruction Fuzzy Hash: A531CBB4D002189FCB14CFA9D584AEEFBB5BF49320F14846AE419B7350D774A945CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ResumeThread.KERNELBASE(?), ref: 09BBBE56
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID:
                                                  • API String ID: 947044025-0
                                                  • Opcode ID: c991fea8c165ec8b1f5dcd80cdd3637cfb6705b25b38af0a6bc1b735303132e1
                                                  • Instruction ID: e9265ff121e7d55554c8cdf4b805ac870b28ea3ef6aa5d962326262ac546263f
                                                  • Opcode Fuzzy Hash: c991fea8c165ec8b1f5dcd80cdd3637cfb6705b25b38af0a6bc1b735303132e1
                                                  • Instruction Fuzzy Hash: D631CBB4D002189FCB10CFA9D580AEEFBB4BF49310F10842AE419B7250C774A841CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 09F710BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041857882.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9f70000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: f534131b38a57159fe15c6e4f8222c51440d8f2ac5dd16b942834ecffe290e9e
                                                  • Instruction ID: 40eaedf2fc79ebd2090af9bfb26471986c37ab49ff1809189a5748f8518d3a2d
                                                  • Opcode Fuzzy Hash: f534131b38a57159fe15c6e4f8222c51440d8f2ac5dd16b942834ecffe290e9e
                                                  • Instruction Fuzzy Hash: A431BBB9D00258DFCB10CFA9D584ADEFBF4AB08314F24805AE855B7310D339AA45CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 09F710BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041857882.0000000009F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 09F70000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9f70000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotification
                                                  • String ID:
                                                  • API String ID: 2591292051-0
                                                  • Opcode ID: 1ef1f91756f029c981613206e200fcb567c0ca80f48574617af3497295896f4d
                                                  • Instruction ID: ba34874344c9951feebedc28decf20a1a932e1d8101607d89d62686f554bc479
                                                  • Opcode Fuzzy Hash: 1ef1f91756f029c981613206e200fcb567c0ca80f48574617af3497295896f4d
                                                  • Instruction Fuzzy Hash: 4531ACB5D042589FCB10CFA9D584ADEFBF4AF08310F14805AE815B7350D379AA45CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032191549.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_168d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c473abe49bc0f9397a9fd04534eb4ae236352a2315700ede70b53bb2c891be58
                                                  • Instruction ID: 426c783fab44f6638485cc35c74b5d1bca6a45acef5aedfa72c98337d9427648
                                                  • Opcode Fuzzy Hash: c473abe49bc0f9397a9fd04534eb4ae236352a2315700ede70b53bb2c891be58
                                                  • Instruction Fuzzy Hash: F7210671500240DFDB15EF58D9C0F26BF65FB88318F20C66AD9090B396C336D416C6B2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032219731.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_169d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c83982ad03b19621a10d960af0ffa631ecb454331d8ad9a93a432ba370d8b785
                                                  • Instruction ID: 36f474213c39511f2bbdeb369a3b8d3d6924bd9f787d43fe0b1c385271279552
                                                  • Opcode Fuzzy Hash: c83982ad03b19621a10d960af0ffa631ecb454331d8ad9a93a432ba370d8b785
                                                  • Instruction Fuzzy Hash: 7121F5715443049FDF05DF98D9C0B16BB69FB84324F20C5BDDA094B396C37AD406CAA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032219731.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_169d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3133582eb52a45096093ab995e272b6bb8a3c2c80cd1c7cd9d316f792dd580f8
                                                  • Instruction ID: cf948148d0bc5d3c3fbf77094b0b8a0c76cc8dfe0bddc0c6adf47685ab86e07b
                                                  • Opcode Fuzzy Hash: 3133582eb52a45096093ab995e272b6bb8a3c2c80cd1c7cd9d316f792dd580f8
                                                  • Instruction Fuzzy Hash: 80210071604200DFDF15DFA8D984B26BF69FB88354F20C579D90A0B396C33AD407CA61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032219731.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_169d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c243d87846a209092497f1b85f6d88016745191cb4d1e658ab64446f17b9557a
                                                  • Instruction ID: cf285cfb3fcb6c70a4068f0e987ebdf55d2d598ffbc21c445d2c1afe8787f2dc
                                                  • Opcode Fuzzy Hash: c243d87846a209092497f1b85f6d88016745191cb4d1e658ab64446f17b9557a
                                                  • Instruction Fuzzy Hash: 7F219F755083809FDB02CF64D994B11BFB5FB46314F24C5EAD8498F2A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032191549.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_168d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                  • Instruction ID: 9d93f731ce91a53eac2cf3f840078365a5c6fbdc5c3d6abe753cee4512ded2d7
                                                  • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                                  • Instruction Fuzzy Hash: BD11DF72404280DFCB02DF54D9C4B16BF71FB88314F24C6AAD9490B656C336D45ACBB2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032219731.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_169d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction ID: 1cf95848da4b463b4faf4b2560da97da1688d0ffd3cd857edc0afb767639760c
                                                  • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                                  • Instruction Fuzzy Hash: 66119D75504280DFDB06CF94D9C4B15BFA2FB88324F24C6A9D9494B796C33AD44ACBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: W[S%$vp}Q
                                                  • API String ID: 0-355715107
                                                  • Opcode ID: 6d21c050b580e05c43ad76d181c1f3a68091127ac574cbd2754a6c9c372ad979
                                                  • Instruction ID: 7a91454a459f7ceefa1969b7d8c2bc1f9da56487b7b198f3ad17ba6bd52872f6
                                                  • Opcode Fuzzy Hash: 6d21c050b580e05c43ad76d181c1f3a68091127ac574cbd2754a6c9c372ad979
                                                  • Instruction Fuzzy Hash: 9461D774E15219CFCF04CFA9C9848EEFBF2FB88314F28956AD406B7214D77499428B55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ji5q$ji5q
                                                  • API String ID: 0-2016025989
                                                  • Opcode ID: a4f427e4870af49e51f305d49a17c893aa70c57dcde6208bc1e43ebbf89bcf69
                                                  • Instruction ID: 6e983324c430b5f695ac878c07054a65ca9adc8d7b4938cd60ec10b2fccb0e12
                                                  • Opcode Fuzzy Hash: a4f427e4870af49e51f305d49a17c893aa70c57dcde6208bc1e43ebbf89bcf69
                                                  • Instruction Fuzzy Hash: 1D71C3B4D0620ADFCB04CFA9C9849AEFBF2BF88350F148659D415AB314D734A982CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: W[S%$vp}Q
                                                  • API String ID: 0-355715107
                                                  • Opcode ID: 38043f46daa3070551b5c54eb6f4f1619f08960f393ab4d13f01b830dc616672
                                                  • Instruction ID: ad6713fc9ff5c09129156c314ca81d74c865fc383bc79b7c4dae177669e52c21
                                                  • Opcode Fuzzy Hash: 38043f46daa3070551b5c54eb6f4f1619f08960f393ab4d13f01b830dc616672
                                                  • Instruction Fuzzy Hash: A461F678E15209CFCF04CFA9CA845EEFBF2FF88214F28956AD406B7214D7349A528B54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ji5q
                                                  • API String ID: 0-3085614024
                                                  • Opcode ID: 93c162c8bb341a11fd84343b219c88cfc9af4de62f6bd6d22e5a6aaf7577cd58
                                                  • Instruction ID: 194faab97da389881c548469a6a8fb89d0dab191a64024c57e23bb852de94b34
                                                  • Opcode Fuzzy Hash: 93c162c8bb341a11fd84343b219c88cfc9af4de62f6bd6d22e5a6aaf7577cd58
                                                  • Instruction Fuzzy Hash: 7261D574D0620A8FCB04CFA9C9849AEFFF2BF89210F158656D415EB315D7349942CF95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2b20a250e6c23f7fe33d667439c798c08921e872ad56eac38f551ec67bd2c94
                                                  • Instruction ID: 976bc934d560cf1149ba32a2a3e8c6593dd09e8491121c7f524c5972e043f046
                                                  • Opcode Fuzzy Hash: e2b20a250e6c23f7fe33d667439c798c08921e872ad56eac38f551ec67bd2c94
                                                  • Instruction Fuzzy Hash: C3E1F874E012198FDB14CFA8C580AAEBBF2FF89315F2481A9D418AB356D771AD41CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ada7021c27d3439e98f66db8d637ead1fd57175a2fc61a6dff86c65ee0bf21c0
                                                  • Instruction ID: 5136a70b144e9a7c33e4061d31f158c1c230811ca9c90de0f1f77c78c0dcfe86
                                                  • Opcode Fuzzy Hash: ada7021c27d3439e98f66db8d637ead1fd57175a2fc61a6dff86c65ee0bf21c0
                                                  • Instruction Fuzzy Hash: F6E1F774E002199FDB14CFA9C5809AEBBF2FF89315F24C1AAD418AB356D770A941CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 99e05a22535db7ad84ea741c764332fe709c298313a140086158382ebd8f8f0d
                                                  • Instruction ID: dffe956dc0af8f3b26f5e29c64e3be1e4a9531b017033cbc9d4d4af134126418
                                                  • Opcode Fuzzy Hash: 99e05a22535db7ad84ea741c764332fe709c298313a140086158382ebd8f8f0d
                                                  • Instruction Fuzzy Hash: 0DE1F774E001198FDB14CFA9C5809AEBBB2FF89315F24C1A9E458AB356D770AD42CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c5e793ec113c7ec764173559c2a1e2c09b3138d42c68cc2d8a121870e821565e
                                                  • Instruction ID: 908183e5d96d79149fe8552cbb2f24f917c14646cabdd210e0530359d71b8f7e
                                                  • Opcode Fuzzy Hash: c5e793ec113c7ec764173559c2a1e2c09b3138d42c68cc2d8a121870e821565e
                                                  • Instruction Fuzzy Hash: 70E1D674E001198FDB14CFA9C5809AEBBF2FF89315F2481A9D419AB356DB70AD41CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e69a2cabe4915adc0a35b474285aa600c0de71ec1959225c846ee3ef85538eef
                                                  • Instruction ID: 4a1b7cd8434f02054f8a10d40da0765e02f4ae66fa07f0a9955ebfd20cd9d9eb
                                                  • Opcode Fuzzy Hash: e69a2cabe4915adc0a35b474285aa600c0de71ec1959225c846ee3ef85538eef
                                                  • Instruction Fuzzy Hash: 14E10874E001198FDB15CFA9C5809AEBBB2FF89315F2481A9D458AB356D770AD41CF60
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66cd7e31b6ac02ba9247cd03825f06a15c7b38a3dfc79893e2044b1a2d9f5d04
                                                  • Instruction ID: c2fbe5222982fca2cdce5e0f8e8b2c5c62b27b2701d88c4e03c1a0ff2e90d210
                                                  • Opcode Fuzzy Hash: 66cd7e31b6ac02ba9247cd03825f06a15c7b38a3dfc79893e2044b1a2d9f5d04
                                                  • Instruction Fuzzy Hash: 68B1C1B0D09228DFDF29CFA5C8447EDBBF2BB49314F0091AAD409AB291D7B54A85CF01
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e68c0b0b304741c60ccb270d68cb7d27ab61e5a9cea9eb6a3990957213a97464
                                                  • Instruction ID: f6b5a2d644dfb680960b5a7e9a5ae1895db6f822d3a177ac0f1ede12f3574823
                                                  • Opcode Fuzzy Hash: e68c0b0b304741c60ccb270d68cb7d27ab61e5a9cea9eb6a3990957213a97464
                                                  • Instruction Fuzzy Hash: E2D11731C2075A8ACB01EF64D954A9DB7B1FFA5300F50C79AD40977221EB74AECACB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a14d46410c1b220938164d0f5aeecd8f1b4a1c1d5b85753f310fd34b353f80f
                                                  • Instruction ID: 48037f1677360403a2ad76f051ff296e411299d9d88efa4f2b9a57fb23c89a9a
                                                  • Opcode Fuzzy Hash: 3a14d46410c1b220938164d0f5aeecd8f1b4a1c1d5b85753f310fd34b353f80f
                                                  • Instruction Fuzzy Hash: 03B1AFB4D09228DFDF29CFA5C8447EDBBF2BB49354F0091AAD409AB281D7B54A85CF41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 766ca6946e1162001360163453d36238ef48670c747b731981302fc234789fa7
                                                  • Instruction ID: d06161e41089e8adae3e9f9857263c82159067a0f34ea0dc4c1b36fcbfd821b6
                                                  • Opcode Fuzzy Hash: 766ca6946e1162001360163453d36238ef48670c747b731981302fc234789fa7
                                                  • Instruction Fuzzy Hash: E9D1F531C2075A8ACB01EF64D954A9DB7B1FFA5300F50C79AD40977220EB74AECACB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a4b08a3b0675c398e473f1519b62958fd622a559567d92a7755aa02866215a36
                                                  • Instruction ID: a91792a2a6622b35998e79d76b501b446791a75c38909890868579cc079954d8
                                                  • Opcode Fuzzy Hash: a4b08a3b0675c398e473f1519b62958fd622a559567d92a7755aa02866215a36
                                                  • Instruction Fuzzy Hash: 3E61B374E051199BCB04DFAAC5909AEFBF2FF88310F24D169E419AB355DB31A942CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20749910f256e178fdbb529cf18a8907c205f03ed346698727296fb18ec0ae51
                                                  • Instruction ID: 1a925f0ac5ecb6d4aa1f8662824ffb574e74db23b6f114f2957c7b4fb0a856cc
                                                  • Opcode Fuzzy Hash: 20749910f256e178fdbb529cf18a8907c205f03ed346698727296fb18ec0ae51
                                                  • Instruction Fuzzy Hash: D86149B4E1520A9FDB05CFAAC8845EEFFF2AF89304F14C26AD515AB255D3349642CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1d5edab270773a2923eef3a83fd95321de9bbfe336cbd0d6dc89e39f55d37d70
                                                  • Instruction ID: 7cc1497df8ee73fa9922f8d236fc441d6be68fa9cdab544f584b15f2f6278b46
                                                  • Opcode Fuzzy Hash: 1d5edab270773a2923eef3a83fd95321de9bbfe336cbd0d6dc89e39f55d37d70
                                                  • Instruction Fuzzy Hash: 60511B74E062089FCB05DFAAD9805EEBBF2FF89310F14C16AE408AB355D7719946CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1376c77366ca2e0a84613ca551f55a16eb4ac0b18b97eb062c811937afa40810
                                                  • Instruction ID: abb0989e00789b85643c3f5e94a52bc57e295f1d90170162801f9c31837307ec
                                                  • Opcode Fuzzy Hash: 1376c77366ca2e0a84613ca551f55a16eb4ac0b18b97eb062c811937afa40810
                                                  • Instruction Fuzzy Hash: 1C512A70E002198FDB15CFA9C5805AEFBF2FF89315F24C1AAD458AB256D7309941CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1d3c1b0a3b92ef54e9ca9b204002416266187e7abb0b5696a002a6ff813bd04e
                                                  • Instruction ID: f4b9f8546a57f511b311fac1af33e012f0861ceac7a051b95e54fbbbb754a061
                                                  • Opcode Fuzzy Hash: 1d3c1b0a3b92ef54e9ca9b204002416266187e7abb0b5696a002a6ff813bd04e
                                                  • Instruction Fuzzy Hash: 6B410974E0520ADFDB08CFA9C9855EEFBF2BF89310F24D66AC406AB254D7305A51CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4216183e755764c50e58178b3fb58f25a75b12067051966bd392b977b9adf7a6
                                                  • Instruction ID: d4f9cfb83e46f37d0ca5671ce14be115b90a5644c44564a70377e017aea4ec5f
                                                  • Opcode Fuzzy Hash: 4216183e755764c50e58178b3fb58f25a75b12067051966bd392b977b9adf7a6
                                                  • Instruction Fuzzy Hash: 7A410974E0520ADBDB04CFAAC9855EEFBF2BF89310F24D56AC40ABB254D7345A41CB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d272ed00f38ec70d7bace1afa841eb8891d8988f7169bfa6291bd624b8c9607
                                                  • Instruction ID: a02206c5d651ca451542811cfd9ca9d78a180e0fbc459fe87176a3808d55ef65
                                                  • Opcode Fuzzy Hash: 9d272ed00f38ec70d7bace1afa841eb8891d8988f7169bfa6291bd624b8c9607
                                                  • Instruction Fuzzy Hash: DE41E774E056188FDB08DFAAC99059EFBF2FF88310F14C16AD408AB355DB359946CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 294b33b9fd6ed9205d177c2737ececf583d4f24429cfdfcea0f60b550b3750aa
                                                  • Instruction ID: 1f2e0b48c10f458a9058fb7526cbe46b66747315b5a5ad5ca0168fb456297a00
                                                  • Opcode Fuzzy Hash: 294b33b9fd6ed9205d177c2737ececf583d4f24429cfdfcea0f60b550b3750aa
                                                  • Instruction Fuzzy Hash: 65416E71E016588BEB28CF6B8D4439DFBF3AFC9301F14C1BA950CA6225DB300A568F51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65a6dfbad92624af720997dabfe3ceaa6743e0946dfc2e3a4b7a4e49e4733247
                                                  • Instruction ID: f9700c25350a8db4367cecfd662511240c741170c1f01dd7b5566be5b8ad6bb6
                                                  • Opcode Fuzzy Hash: 65a6dfbad92624af720997dabfe3ceaa6743e0946dfc2e3a4b7a4e49e4733247
                                                  • Instruction Fuzzy Hash: 9241E6B4E1560A8FCB44CFAAC8845AEFBF2BF88304F14D569C41AF7214D7349A428F94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2032344484.00000000016E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_16e0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f0be650df4ec871e11d84fc225666c0cd55040df917c0bc46ebab8f073806d32
                                                  • Instruction ID: 8ec2733f70e3405c4ef7d03359c82ee152cb6da9dfea6738a5874c044d7893a7
                                                  • Opcode Fuzzy Hash: f0be650df4ec871e11d84fc225666c0cd55040df917c0bc46ebab8f073806d32
                                                  • Instruction Fuzzy Hash: 8E41F8B4E1560A8FCB04CFA9C9845AEFBF2BF88314F14C56AC515AB254D7349642CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8590f37375a47df3974222c54739a7cd56f2bf36a3d116c1dca468847d73a5b2
                                                  • Instruction ID: eb8cc20b83e680f74e6286d9f22a5921862998e82d2e6d412d73d55554bbab89
                                                  • Opcode Fuzzy Hash: 8590f37375a47df3974222c54739a7cd56f2bf36a3d116c1dca468847d73a5b2
                                                  • Instruction Fuzzy Hash: 43318DB8D05208EFCB14CFA9D594AEDBBF1BB89360F249169E814BB390D3749941CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f3eb39035948898d0ff35ac1292a786f30aee93b01cd3182df15c41af26a3df6
                                                  • Instruction ID: 731e8196a2aa755c65959357606677d69a339a8d9e4ea5915cb6d785b2b93555
                                                  • Opcode Fuzzy Hash: f3eb39035948898d0ff35ac1292a786f30aee93b01cd3182df15c41af26a3df6
                                                  • Instruction Fuzzy Hash: C8318EB8D05208EFCB14CFA9D494AEEBBF1BB89360F249169E814B7390D3749941CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa22ada02bbcab26d0357eb1ff02f356933f98f0a9c6b7c94421a2b391c46653
                                                  • Instruction ID: 718f73ac1bbd4f282587e96c46bcfc8d55256db32428423cccbeafeebe8a21f2
                                                  • Opcode Fuzzy Hash: fa22ada02bbcab26d0357eb1ff02f356933f98f0a9c6b7c94421a2b391c46653
                                                  • Instruction Fuzzy Hash: 86219274D042099FDB04CFAAD4446EDBBB1FB4A320F24D169E814BB2A0D7748541CF54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 039efdfc2b0bd57aac337bd36e6fa26017f8dc623de60ba37596f1f806e6770f
                                                  • Instruction ID: 29cb902b9413a837b91f431fad92f55785e736984b599faa053eb3cb555ce663
                                                  • Opcode Fuzzy Hash: 039efdfc2b0bd57aac337bd36e6fa26017f8dc623de60ba37596f1f806e6770f
                                                  • Instruction Fuzzy Hash: BD217F78D042089FDB04CFAAD4546EDBBF1BB49320F10E169E814BB290D7749541CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2bf4cc80ffe275c451d6cd6a62105c6d3aca0ae256d82407eb1824b666c5bf47
                                                  • Instruction ID: 50218ddb496c938baf7afedad1e793edaebbb0af4d99d217802eccec41375846
                                                  • Opcode Fuzzy Hash: 2bf4cc80ffe275c451d6cd6a62105c6d3aca0ae256d82407eb1824b666c5bf47
                                                  • Instruction Fuzzy Hash: B7F09CB5E152089F8F04DFA9D4414EEFBF2AB5A311F10A166D804B7310D33589518F68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                  • Instruction ID: 383d943dfa6ecc2645028fa5a55496d291542a0477846c4a87719d326fc0dbbb
                                                  • Opcode Fuzzy Hash: 9eb7edaa31dfbf35867dc96d8b8f8c426529f6e1b54484e160c576f9eb5ddf33
                                                  • Instruction Fuzzy Hash: 12F042B5D0520C9F8F04DFAAD5418EEFBF2AB59310F10A16AE814B7310E73599518FA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c78346c2c6a33f1bf9d9da0a6fb53135ecc54b1d2bc50bcc8d38ac73d90d506
                                                  • Instruction ID: af85d4fac1f02b35d83054ac562db20e4e8b5e88aedad24ef3591fa2941f475b
                                                  • Opcode Fuzzy Hash: 9c78346c2c6a33f1bf9d9da0a6fb53135ecc54b1d2bc50bcc8d38ac73d90d506
                                                  • Instruction Fuzzy Hash: 9DE05034989218DFC7148F54E4596F8B77CE74A361F0060D9D50FA61A2D670D585CA91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2041528262.0000000009BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09BB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_9bb0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0998ba4ab90d114b5b3bb3988cb55177f5082c22388c5adbe48125a835abac28
                                                  • Instruction ID: 645eed9fa4336d1bc48bf7dc8b2e109561916994c53b61cd3d74d3289afd41b0
                                                  • Opcode Fuzzy Hash: 0998ba4ab90d114b5b3bb3988cb55177f5082c22388c5adbe48125a835abac28
                                                  • Instruction Fuzzy Hash: F3E092358C8218DFC710CB90B45A2F8BB7CF74B3A2F0171C9D90E9A162C23485418FA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:4.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:4
                                                  Total number of Limit Nodes:1
                                                  execution_graph 26049 606cf88 26051 606cf9d 26049->26051 26050 606d1b2 26051->26050 26052 606d59e GlobalMemoryStatusEx 26051->26052 26052->26051
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3281643894.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_10c0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8149790ab129fa1e47c423ce5e8eec0c13811129f9a81864cdd2c9e987519e1b
                                                  • Instruction ID: 1b641b61b4270a71f40b0b2f026f1d79b87dc224ee9942286cb2095aedf2aa27
                                                  • Opcode Fuzzy Hash: 8149790ab129fa1e47c423ce5e8eec0c13811129f9a81864cdd2c9e987519e1b
                                                  • Instruction Fuzzy Hash: 9C53E431C10B1A8ADB51EB68C8845ADF7B1FF99300F15C79AE4587B121EB70AAD5CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2262 606e190-606e1ab 2263 606e1d5-606e1f4 call 606d59c 2262->2263 2264 606e1ad-606e1d4 call 606d590 2262->2264 2270 606e1f6-606e1f9 2263->2270 2271 606e1fa-606e259 2263->2271 2277 606e25f-606e2ec GlobalMemoryStatusEx 2271->2277 2278 606e25b-606e25e 2271->2278 2281 606e2f5-606e31d 2277->2281 2282 606e2ee-606e2f4 2277->2282 2282->2281
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3285230730.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6060000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 29960e4848dda8dd4aaf8b3b5eca81faa1276c164bc4a0d7a365c458bc40c4b8
                                                  • Instruction ID: d4ea12693c62dd7af6339b80d675be0188cded11b57a5555dca7ad581f768d52
                                                  • Opcode Fuzzy Hash: 29960e4848dda8dd4aaf8b3b5eca81faa1276c164bc4a0d7a365c458bc40c4b8
                                                  • Instruction Fuzzy Hash: 65410471D187958FCB04CFA9D8546DEBFF1EF89310F1485AAE404A7281DB789885CBE1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 2285 606e278-606e2b6 2286 606e2be-606e2ec GlobalMemoryStatusEx 2285->2286 2287 606e2f5-606e31d 2286->2287 2288 606e2ee-606e2f4 2286->2288 2288->2287
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0606E2DF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3285230730.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_6060000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 17b86eb2730d26c0c29208dbcbd0a3ab4004021aad946151deaf3df0566de28c
                                                  • Instruction ID: 06073f4789a4c26b14b7253debab22552c433870fe571fd964670149377ef3c3
                                                  • Opcode Fuzzy Hash: 17b86eb2730d26c0c29208dbcbd0a3ab4004021aad946151deaf3df0566de28c
                                                  • Instruction Fuzzy Hash: 1711E2B1C0065A9BCB10DF9AC544BEEFBF4AF48320F14816AE918B7240D778A944CFE5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3281643894.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_10c0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH]q
                                                  • API String ID: 0-3168235125
                                                  • Opcode ID: 6eca485642456105b8b0cf0615642db74b31645e5ed19c33dc9c6ce519807b46
                                                  • Instruction ID: 2e02756bdff094e74d14d4f0d0078c91ce4a5c49354c7ff25385350ccea7018a
                                                  • Opcode Fuzzy Hash: 6eca485642456105b8b0cf0615642db74b31645e5ed19c33dc9c6ce519807b46
                                                  • Instruction Fuzzy Hash: 8A3135307002028FDB59AB38E5606AE7FE7AF89640F2445BCD046DB395DE34CC46CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3281643894.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_10c0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d35052d07b29c79d856788e36f1ceceebf7bf93464c2b6fdf721089e4a2660f2
                                                  • Instruction ID: 5027660bf713cd2ea4ff18726f129a5e128e6c54e5375b886ed84d10709c908e
                                                  • Opcode Fuzzy Hash: d35052d07b29c79d856788e36f1ceceebf7bf93464c2b6fdf721089e4a2660f2
                                                  • Instruction Fuzzy Hash: 5DC10330B00216AFEB15DB68C880B6EBBA6FBC4710F148569D449DB396DB35EC42CBD1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3281643894.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_10c0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7f4be9910f623a58373a1309094950acb538d19486a2bca5868ac0447e724c5
                                                  • Instruction ID: 18270ac06dc42f865aae7998e32e883931610b490384b2a698ec1b7f37919257
                                                  • Opcode Fuzzy Hash: b7f4be9910f623a58373a1309094950acb538d19486a2bca5868ac0447e724c5
                                                  • Instruction Fuzzy Hash: 0E316B35E002069BDB19CF68D89469EBBF2FF89700F108529E846E7350EB70E842CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3281643894.00000000010C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_10c0000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 203626b31c27814cd14c6956646613b8fe3f5c4ddc6eb49d731c648550d4785d
                                                  • Instruction ID: b453e61d36ed893f40634537ba60f5f7c87c3d6689b75fb26852181000320351
                                                  • Opcode Fuzzy Hash: 203626b31c27814cd14c6956646613b8fe3f5c4ddc6eb49d731c648550d4785d
                                                  • Instruction Fuzzy Hash: F6314B34E102069BDB59DF69D49469EBBF2BF89700F10C52DE846EB351DB70AC42CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3280965444.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_d2d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b06ba971d7e847d530a87e0912de90255c6f3731add58d6f207a1a37ee7d4e0
                                                  • Instruction ID: 0238eed15a959c8356ef9e7138063e527d32b615c8bbecb3dab198f3d74233dd
                                                  • Opcode Fuzzy Hash: 7b06ba971d7e847d530a87e0912de90255c6f3731add58d6f207a1a37ee7d4e0
                                                  • Instruction Fuzzy Hash: 5921F571504244DFCB14DF24E684B16BF66FBA4318F24C569D9494B2A6C33AD807CA71
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3280965444.0000000000D2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D2D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_d2d000_SecuriteInfo.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a6f09d75b91390530d0212c5452a5d5999bfc14fc255d97df31ad4ec083d340
                                                  • Instruction ID: 64f5dc31b28cefc75f7162006caaa75b5d2f3cc27b826d98c11423ab1b7087a7
                                                  • Opcode Fuzzy Hash: 3a6f09d75b91390530d0212c5452a5d5999bfc14fc255d97df31ad4ec083d340
                                                  • Instruction Fuzzy Hash: F22150755093808FDB12CF24D994715BF72EB56314F28C5EAD8498B6A7C33A980ACB62
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%