Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Catalina - Particulars.pdf.scr.exe

Overview

General Information

Sample name:Catalina - Particulars.pdf.scr.exe
Analysis ID:1500931
MD5:316329f616d991c23b6718ba353a6b3a
SHA1:01afaeed5a260c3909b2e14041cee23923c2d6d3
SHA256:eec4404be651d77865707efa282ec7899a97550ad25351a70a926679f6b34bdf
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Catalina - Particulars.pdf.scr.exe (PID: 6636 cmdline: "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe" MD5: 316329F616D991C23B6718BA353A6B3A)
    • powershell.exe (PID: 2120 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x312d3:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31345:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x313cf:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31461:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x314cb:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3153d:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x315d3:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31663:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2e6c6:$s2: GetPrivateProfileString
                • 0x2ddc5:$s3: get_OSFullName
                • 0x2f403:$s5: remove_Key
                • 0x2f592:$s5: remove_Key
                • 0x30473:$s6: FtpWebRequest
                • 0x312b5:$s7: logins
                • 0x31827:$s7: logins
                • 0x3450a:$s7: logins
                • 0x345ea:$s7: logins
                • 0x35ee6:$s7: logins
                • 0x35184:$s9: 1.85 (Hash, version 2, native byte-order)
                0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 17 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ParentImage: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe, ParentProcessId: 6636, ParentProcessName: Catalina - Particulars.pdf.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ProcessId: 2120, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ParentImage: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe, ParentProcessId: 6636, ParentProcessName: Catalina - Particulars.pdf.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ProcessId: 2120, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ParentImage: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe, ParentProcessId: 6636, ParentProcessName: Catalina - Particulars.pdf.scr.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe", ProcessId: 2120, ProcessName: powershell.exe
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Catalina - Particulars.pdf.scr.exeAvira: detected
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://beirutrest.com", "Username": "belogs@beirutrest.com", "Password": "9yXQ39wz(uL+"}
                  Source: Catalina - Particulars.pdf.scr.exeReversingLabs: Detection: 28%
                  Source: Catalina - Particulars.pdf.scr.exeVirustotal: Detection: 35%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: Catalina - Particulars.pdf.scr.exeJoe Sandbox ML: detected
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 4x nop then jmp 06E2412Fh0_2_06E24256
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 4x nop then jmp 06E2412Fh0_2_06E2429B
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 4x nop then jmp 06E2412Fh0_2_06E247E9

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Joe Sandbox ViewIP Address: 50.87.144.157 50.87.144.157
                  Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                  Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                  Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownDNS query: name: api.ipify.org
                  Source: unknownDNS query: name: api.ipify.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                  Source: global trafficDNS traffic detected: DNS query: beirutrest.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://beirutrest.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1668490592.000000000270E000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4102529284.0000000006263000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673312818.0000000005054000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49732 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, n00.cs.Net Code: lGCzgIzdr
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, n00.cs.Net Code: lGCzgIzdr

                  System Summary

                  barindex
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: initial sampleStatic PE information: Filename: Catalina - Particulars.pdf.scr.exe
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BBDFB80_2_04BBDFB8
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BB6C800_2_04BB6C80
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BB6C710_2_04BB6C71
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BBDFA80_2_04BBDFA8
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BB48C40_2_04BB48C4
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06C4C5980_2_06C4C598
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06C4C5890_2_06C4C589
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06C400400_2_06C40040
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06C4FA680_2_06C4FA68
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E23FA00_2_06E23FA0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E216E80_2_06E216E8
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E216D70_2_06E216D7
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E23FD00_2_06E23FD0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E200400_2_06E20040
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E200070_2_06E20007
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_072260140_2_07226014
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027CE5B85_2_027CE5B8
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027C4A585_2_027C4A58
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027C3E405_2_027C3E40
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027CDD385_2_027CDD38
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027C41885_2_027C4188
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027CA9E05_2_027CA9E0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0662A4EC5_2_0662A4EC
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066289705_2_06628970
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0662B5F85_2_0662B5F8
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0662D3F05_2_0662D3F0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066365F05_2_066365F0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066355A05_2_066355A0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_06637D805_2_06637D80
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0663B2385_2_0663B238
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066330605_2_06633060
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0663C1905_2_0663C190
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066376A05_2_066376A0
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_06635CE35_2_06635CE3
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066302B75_2_066302B7
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_066323405_2_06632340
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_0663E3A85_2_0663E3A8
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1668490592.000000000270E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1674158208.0000000006DD0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000000.1648044295.0000000000306000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiGIh.exeB vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1668490592.00000000026A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1667141653.00000000007AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1674884092.0000000008590000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097857547.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename2ee75d06-d489-4537-90fc-92fe0f559436.exe4 vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097603804.00000000007D9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exeBinary or memory string: OriginalFilenameiGIh.exeB vs Catalina - Particulars.pdf.scr.exe
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, NpXw3kw.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, gyfrCFT5x9I.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, fpnV0Qjz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, fpnV0Qjz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, B2L5aEjRXysgRIZRuW.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, B2L5aEjRXysgRIZRuW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: _0020.AddAccessRule
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, B2L5aEjRXysgRIZRuW.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, B2L5aEjRXysgRIZRuW.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: _0020.SetAccessControl
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, nYi8BSaNnGjlIS3QtT.csSecurity API names: _0020.AddAccessRule
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/6@2/2
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Catalina - Particulars.pdf.scr.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:648:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rq405u4c.ocl.ps1Jump to behavior
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Catalina - Particulars.pdf.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Catalina - Particulars.pdf.scr.exeReversingLabs: Detection: 28%
                  Source: Catalina - Particulars.pdf.scr.exeVirustotal: Detection: 35%
                  Source: unknownProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.26d950c.0.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, nYi8BSaNnGjlIS3QtT.cs.Net Code: KeWhwfxWg3 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, nYi8BSaNnGjlIS3QtT.cs.Net Code: KeWhwfxWg3 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.6dd0000.4.raw.unpack, .cs.Net Code: System.Reflection.Assembly.Load(byte[])
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BB2208 push 18418B02h; ret 0_2_04BB2463
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BBC970 push C0335002h; mov dword ptr [esp], eax0_2_04BBC9A3
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_04BB8AEE push 8B5004BBh; iretd 0_2_04BB8AF3
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06C485DE push edx; iretd 0_2_06C485DF
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E27C0A push dword ptr [ebx+ebp-75h]; iretd 0_2_06E27C15
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_06E27D05 push FFFFFF8Bh; iretd 0_2_06E27D07
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 0_2_0722051A push FFFFFF8Bh; iretd 0_2_07220532
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeCode function: 5_2_027C0C55 push edi; retf 5_2_027C0C7A
                  Source: Catalina - Particulars.pdf.scr.exeStatic PE information: section name: .text entropy: 7.976543607556141
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, SV8ANt0wonSLuisvxS.csHigh entropy of concatenated method names: 'wl3RuyJngo', 'wP6R3U90XX', 'OL7RQruLNu', 'zW6RGnxHve', 'hfCRfjFxpy', 'U7ERkKIs0F', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, bNrLNsXJefjX0OEBeq.csHigh entropy of concatenated method names: 'WrBwU4ABY', 'e4xTTIg86', 'cE91bX4hH', 'BJVtZCAPD', 'wQbI8oTRj', 'dv8n47KQf', 'EOyptK3VHQoRFEu2hd', 'uYfV58i55YMnxmqUgX', 'HpPRA6VAq', 'Aj5duPKkO'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, bVCVi0Cowk2d0DhiSK6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'a2ydfVRn8p', 'aRsdBPjpgC', 'M2Ldr1As15', 'eb3dcciw5L', 'KKMdmkE59C', 'mfNder4iLM', 'WvndKTEyOQ'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, zA0pYrs0iP2yVuupk9.csHigh entropy of concatenated method names: 'UfBACBy7Tp', 'EdNAoJvL17', 'qkUAhJWoD5', 'CZaAO3slN1', 'XtdAFHHYtM', 't19APq7q8q', 'F2eAMS14AU', 'WF7RKBTDIA', 'YowRZOAOxl', 'QtjR0TgZbk'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, B2L5aEjRXysgRIZRuW.csHigh entropy of concatenated method names: 'x0oFfx6XVH', 'r8xFBqGLrT', 'oJ6FrgogOw', 'kaiFcrVjqT', 'udSFm77oJT', 'n9nFeJpvh9', 'PuJFKy6gDy', 'mfqFZc1HCL', 'E74F0Cga1a', 'i10FsCxLB3'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, SpQ6yTpEUGYePwvqpE.csHigh entropy of concatenated method names: 'hUjvOW7kWI', 'VD7v64uQBR', 'VPIvMp3kub', 'o6lMspM26j', 'qwWMzkwvMN', 'qULvEs2iri', 'uB1vCUJwID', 'xFsvX6dH0q', 'sRHvoeQi2y', 'SJwvhfI0JN'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, HhjDVKzjmJsIdajAeY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'imkAyhPRG9', 'fTkASUNGRb', 'ijuALdmDlY', 'mttAH4w0jy', 'f2LARD5T2T', 'QvQAACJWF4', 't8xAdnxMec'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, vcj5BQINYp1945GiEM.csHigh entropy of concatenated method names: 'Rxv6TVcciw', 'Urd61EdWTq', 'kCe6jqLcw7', 'QN96IItR3a', 'yNo6SDRBZF', 'qGx6LoFote', 'niW6HSCgUO', 'jA26R6caRg', 'wNt6AT8WxZ', 'zff6djT2Qm'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, FenasDCE6e4gGUpOoCX.csHigh entropy of concatenated method names: 'zEWAbTMmNd', 'mPKANfGPuW', 'tf1Aw2A0MU', 'nM8ATsF6SG', 'xmFAY6ra2G', 'qmQA15GgxV', 'TX7Ato7M87', 'LUuAjwfK1C', 'zixAI3Usgs', 'rgcAnTmu1M'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, BHYXdseLAfHAZxY0Cf.csHigh entropy of concatenated method names: 'jbaHZYckcP', 'I2wHsK6FX7', 'Qa9REFDg6L', 'POZRCO6uvl', 'I1qH824PZk', 'byeH49Baj1', 'zy3Hib8Jsv', 'hlGHfZdGtu', 'IQVHB6Wbii', 'nxiHrLIvjB'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, Lc7ZWBr63vE8ZV0QGZ.csHigh entropy of concatenated method names: 'ToString', 'xJXL8PeNHv', 'seNL36dMSR', 'e9rLQhrvKX', 'UqGLGMLRv2', 'dxaLkIpst5', 'CxOL2Unp4f', 'z8iLp0xxVS', 'wQeLDaJ8SV', 'bB3LqEbvMs'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, yd5lVYZaW1XkY2Gjwn.csHigh entropy of concatenated method names: 'yPuRO74lZ4', 'qfhRFBkb5B', 'WtMR6eDmkx', 'JC3RP6U2av', 'gDWRMo8Iws', 'mgTRvtXG5H', 'IxyRaSwp1w', 'e8SRJaPDmj', 'BPiR9XmmeC', 'QfiRWiabgo'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, R8KxRyfHXE6S7906P5.csHigh entropy of concatenated method names: 'F0dSVdI78s', 'ppsS4l0gKi', 'HhESfw6HeV', 'gOZSBXpYUD', 'qe3S3iHC6L', 'mcOSQwDFfH', 'cnXSGVlr2F', 'tNiSkn3VjH', 'jCHS2P1uow', 'jx0SpcH6KQ'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, nYi8BSaNnGjlIS3QtT.csHigh entropy of concatenated method names: 'eFgogDRgm3', 'seDoOx6JaC', 'oHQoFLbEFg', 'm25o6sU6Wg', 'T7yoPTC5Bx', 'M1PoMClTr4', 'D1BovoRm1M', 'sDtoawmkta', 'dyuoJwfRxI', 'kcto9xXrwq'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, Y54GlDujCA6OvrPjFG.csHigh entropy of concatenated method names: 'A7CMgoR6ad', 'WW5MFUt4IB', 'qaqMP6bKY8', 'O6qMvV75Uv', 'BCSMaEMLlv', 'fglPmMXVGg', 'RiaPeSl2OI', 'b9UPKIgaqB', 'WwuPZkwEVc', 'kArP0fQikC'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, O482BBhOkBYacs8xH4.csHigh entropy of concatenated method names: 'rMYCv2L5aE', 'rXyCasgRIZ', 'HNYC9p1945', 'JiECWMAwGZ', 'k4ICSaDs54', 'IlDCLjCA6O', 'nRmWRvEqqEEvTBkBiL', 'VekLimW4etVac9O1UT', 'CQbCCAwwR2', 'bSPCopDexV'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, k5gTp86BiWpSvW8eCv.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'sIjX0V18Dx', 'frTXswRPpa', 'P2IXzgq53N', 'M3doEQ7bMw', 'AFgoC9TqK5', 'M9MoXprUdm', 'Lwuoo4XdN8', 'VQtnGssLtRkTC2yh6a7'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, TUkuLYF4h06tlXn81T.csHigh entropy of concatenated method names: 'Dispose', 'TigC0CB6Wh', 'tYAX3mwS3G', 'HpAjj4C0D9', 'PNdCs5lVYa', 'n1XCzkY2Gj', 'ProcessDialogKey', 'znrXEV8ANt', 'zonXCSLuis', 'jxSXXTA0pY'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, hXZ1F3c6OFljhIYkDZ.csHigh entropy of concatenated method names: 'YO7H9pdiAi', 'EomHWi2CyC', 'ToString', 'jl3HOXup4t', 'PhRHF4jKWS', 'gD0H6fN2VF', 'XxdHP95FGS', 'zyoHMmsdTd', 'eVdHvBa6yH', 'WtBHaXc3jx'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, TvlOHjq6SalyevWevC.csHigh entropy of concatenated method names: 'CMBvbqqu8S', 'XX1vNqdlcg', 'xkFvwkUx4w', 'if3vTrOVxq', 'I0FvYxdyAd', 'VpJv1OOBHS', 'Qt9vtElPRD', 'lSxvjA41jh', 'XjavIAG7fB', 'sYPvnDMJX1'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, rwGZyKnjlyPv9a4IaD.csHigh entropy of concatenated method names: 'JpAPYoclqB', 'oYUPtjOouK', 'D006Q8C9lp', 'EIA6Gveg6D', 'G4B6krb1d8', 'SIa62A887X', 'EKJ6pdnpHk', 'MfU6D6XXyL', 'Wmi6qyMk5V', 'eJU6Vb2qI8'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.38ae4c0.2.raw.unpack, tnv0d5ijxj1clMoWoD.csHigh entropy of concatenated method names: 'P3wyjj4k0b', 'phZyIZfqIt', 'JbEyup4yCD', 'Yaay3WucYm', 'N0hyGHYmft', 'o1mykiPGPI', 'Jcbyp61yWC', 'o6QyDm73Xl', 'qXvyV3bmA4', 'XKyy8eCOmu'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, SV8ANt0wonSLuisvxS.csHigh entropy of concatenated method names: 'wl3RuyJngo', 'wP6R3U90XX', 'OL7RQruLNu', 'zW6RGnxHve', 'hfCRfjFxpy', 'U7ERkKIs0F', 'Next', 'Next', 'Next', 'NextBytes'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, bNrLNsXJefjX0OEBeq.csHigh entropy of concatenated method names: 'WrBwU4ABY', 'e4xTTIg86', 'cE91bX4hH', 'BJVtZCAPD', 'wQbI8oTRj', 'dv8n47KQf', 'EOyptK3VHQoRFEu2hd', 'uYfV58i55YMnxmqUgX', 'HpPRA6VAq', 'Aj5duPKkO'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, bVCVi0Cowk2d0DhiSK6.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'a2ydfVRn8p', 'aRsdBPjpgC', 'M2Ldr1As15', 'eb3dcciw5L', 'KKMdmkE59C', 'mfNder4iLM', 'WvndKTEyOQ'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, zA0pYrs0iP2yVuupk9.csHigh entropy of concatenated method names: 'UfBACBy7Tp', 'EdNAoJvL17', 'qkUAhJWoD5', 'CZaAO3slN1', 'XtdAFHHYtM', 't19APq7q8q', 'F2eAMS14AU', 'WF7RKBTDIA', 'YowRZOAOxl', 'QtjR0TgZbk'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, B2L5aEjRXysgRIZRuW.csHigh entropy of concatenated method names: 'x0oFfx6XVH', 'r8xFBqGLrT', 'oJ6FrgogOw', 'kaiFcrVjqT', 'udSFm77oJT', 'n9nFeJpvh9', 'PuJFKy6gDy', 'mfqFZc1HCL', 'E74F0Cga1a', 'i10FsCxLB3'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, SpQ6yTpEUGYePwvqpE.csHigh entropy of concatenated method names: 'hUjvOW7kWI', 'VD7v64uQBR', 'VPIvMp3kub', 'o6lMspM26j', 'qwWMzkwvMN', 'qULvEs2iri', 'uB1vCUJwID', 'xFsvX6dH0q', 'sRHvoeQi2y', 'SJwvhfI0JN'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, HhjDVKzjmJsIdajAeY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'imkAyhPRG9', 'fTkASUNGRb', 'ijuALdmDlY', 'mttAH4w0jy', 'f2LARD5T2T', 'QvQAACJWF4', 't8xAdnxMec'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, vcj5BQINYp1945GiEM.csHigh entropy of concatenated method names: 'Rxv6TVcciw', 'Urd61EdWTq', 'kCe6jqLcw7', 'QN96IItR3a', 'yNo6SDRBZF', 'qGx6LoFote', 'niW6HSCgUO', 'jA26R6caRg', 'wNt6AT8WxZ', 'zff6djT2Qm'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, FenasDCE6e4gGUpOoCX.csHigh entropy of concatenated method names: 'zEWAbTMmNd', 'mPKANfGPuW', 'tf1Aw2A0MU', 'nM8ATsF6SG', 'xmFAY6ra2G', 'qmQA15GgxV', 'TX7Ato7M87', 'LUuAjwfK1C', 'zixAI3Usgs', 'rgcAnTmu1M'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, BHYXdseLAfHAZxY0Cf.csHigh entropy of concatenated method names: 'jbaHZYckcP', 'I2wHsK6FX7', 'Qa9REFDg6L', 'POZRCO6uvl', 'I1qH824PZk', 'byeH49Baj1', 'zy3Hib8Jsv', 'hlGHfZdGtu', 'IQVHB6Wbii', 'nxiHrLIvjB'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, Lc7ZWBr63vE8ZV0QGZ.csHigh entropy of concatenated method names: 'ToString', 'xJXL8PeNHv', 'seNL36dMSR', 'e9rLQhrvKX', 'UqGLGMLRv2', 'dxaLkIpst5', 'CxOL2Unp4f', 'z8iLp0xxVS', 'wQeLDaJ8SV', 'bB3LqEbvMs'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, yd5lVYZaW1XkY2Gjwn.csHigh entropy of concatenated method names: 'yPuRO74lZ4', 'qfhRFBkb5B', 'WtMR6eDmkx', 'JC3RP6U2av', 'gDWRMo8Iws', 'mgTRvtXG5H', 'IxyRaSwp1w', 'e8SRJaPDmj', 'BPiR9XmmeC', 'QfiRWiabgo'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, R8KxRyfHXE6S7906P5.csHigh entropy of concatenated method names: 'F0dSVdI78s', 'ppsS4l0gKi', 'HhESfw6HeV', 'gOZSBXpYUD', 'qe3S3iHC6L', 'mcOSQwDFfH', 'cnXSGVlr2F', 'tNiSkn3VjH', 'jCHS2P1uow', 'jx0SpcH6KQ'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, nYi8BSaNnGjlIS3QtT.csHigh entropy of concatenated method names: 'eFgogDRgm3', 'seDoOx6JaC', 'oHQoFLbEFg', 'm25o6sU6Wg', 'T7yoPTC5Bx', 'M1PoMClTr4', 'D1BovoRm1M', 'sDtoawmkta', 'dyuoJwfRxI', 'kcto9xXrwq'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, Y54GlDujCA6OvrPjFG.csHigh entropy of concatenated method names: 'A7CMgoR6ad', 'WW5MFUt4IB', 'qaqMP6bKY8', 'O6qMvV75Uv', 'BCSMaEMLlv', 'fglPmMXVGg', 'RiaPeSl2OI', 'b9UPKIgaqB', 'WwuPZkwEVc', 'kArP0fQikC'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, O482BBhOkBYacs8xH4.csHigh entropy of concatenated method names: 'rMYCv2L5aE', 'rXyCasgRIZ', 'HNYC9p1945', 'JiECWMAwGZ', 'k4ICSaDs54', 'IlDCLjCA6O', 'nRmWRvEqqEEvTBkBiL', 'VekLimW4etVac9O1UT', 'CQbCCAwwR2', 'bSPCopDexV'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, k5gTp86BiWpSvW8eCv.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'sIjX0V18Dx', 'frTXswRPpa', 'P2IXzgq53N', 'M3doEQ7bMw', 'AFgoC9TqK5', 'M9MoXprUdm', 'Lwuoo4XdN8', 'VQtnGssLtRkTC2yh6a7'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, TUkuLYF4h06tlXn81T.csHigh entropy of concatenated method names: 'Dispose', 'TigC0CB6Wh', 'tYAX3mwS3G', 'HpAjj4C0D9', 'PNdCs5lVYa', 'n1XCzkY2Gj', 'ProcessDialogKey', 'znrXEV8ANt', 'zonXCSLuis', 'jxSXXTA0pY'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, hXZ1F3c6OFljhIYkDZ.csHigh entropy of concatenated method names: 'YO7H9pdiAi', 'EomHWi2CyC', 'ToString', 'jl3HOXup4t', 'PhRHF4jKWS', 'gD0H6fN2VF', 'XxdHP95FGS', 'zyoHMmsdTd', 'eVdHvBa6yH', 'WtBHaXc3jx'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, TvlOHjq6SalyevWevC.csHigh entropy of concatenated method names: 'CMBvbqqu8S', 'XX1vNqdlcg', 'xkFvwkUx4w', 'if3vTrOVxq', 'I0FvYxdyAd', 'VpJv1OOBHS', 'Qt9vtElPRD', 'lSxvjA41jh', 'XjavIAG7fB', 'sYPvnDMJX1'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, rwGZyKnjlyPv9a4IaD.csHigh entropy of concatenated method names: 'JpAPYoclqB', 'oYUPtjOouK', 'D006Q8C9lp', 'EIA6Gveg6D', 'G4B6krb1d8', 'SIa62A887X', 'EKJ6pdnpHk', 'MfU6D6XXyL', 'Wmi6qyMk5V', 'eJU6Vb2qI8'
                  Source: 0.2.Catalina - Particulars.pdf.scr.exe.8590000.5.raw.unpack, tnv0d5ijxj1clMoWoD.csHigh entropy of concatenated method names: 'P3wyjj4k0b', 'phZyIZfqIt', 'JbEyup4yCD', 'Yaay3WucYm', 'N0hyGHYmft', 'o1mykiPGPI', 'Jcbyp61yWC', 'o6QyDm73Xl', 'qXvyV3bmA4', 'XKyy8eCOmu'

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: Possible double extension: pdf.scrStatic PE information: Catalina - Particulars.pdf.scr.exe
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 6636, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 26A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: CB0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 8610000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 9610000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 9810000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: A810000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: 4950000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599407Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599282Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599157Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599047Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598937Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597896Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597411Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597289Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597121Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596995Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596891Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596782Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596657Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596532Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596407Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596282Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596157Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596047Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595938Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595688Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595563Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595438Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595328Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595219Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594644Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594529Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594410Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594290Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594187Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594078Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593969Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593844Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593735Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3927Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2836Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWindow / User API: threadDelayed 2147Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWindow / User API: threadDelayed 7677Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 6516Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7232Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7192Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep count: 33 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -30437127721620741s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7260Thread sleep count: 2147 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7260Thread sleep count: 7677 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599641s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599516s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599407s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599282s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599157s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -599047s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598937s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -598110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597896s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597547s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597411s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597289s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -597121s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596995s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596891s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596782s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596657s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596532s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596407s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596282s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596157s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -596047s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595938s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595813s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595688s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595563s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595438s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595328s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595219s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -595094s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594984s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594766s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594644s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594529s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594410s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594290s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594187s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -594078s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -593969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -593844s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe TID: 7256Thread sleep time: -593735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599641Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599516Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599407Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599282Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599157Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 599047Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598937Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598828Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598719Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598610Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598485Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598360Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598235Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 598110Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597896Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597719Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597547Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597411Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597289Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 597121Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596995Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596891Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596782Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596657Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596532Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596407Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596282Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596157Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 596047Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595938Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595813Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595688Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595563Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595438Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595328Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595219Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 595094Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594984Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594875Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594766Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594644Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594529Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594410Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594290Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594187Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 594078Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593969Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593844Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeThread delayed: delay time: 593735Jump to behavior
                  Source: Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097857547.0000000000CB5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeMemory written: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeProcess created: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 6636, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 5856, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 6636, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 5856, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Catalina - Particulars.pdf.scr.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36e3f90.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Catalina - Particulars.pdf.scr.exe.36a9970.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 6636, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Catalina - Particulars.pdf.scr.exe PID: 5856, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  1
                  File and Directory Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  24
                  System Information Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)13
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  1
                  Query Registry
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                  Software Packing
                  NTDS111
                  Security Software Discovery
                  Distributed Component Object Model1
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets1
                  Process Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                  Masquerading
                  Cached Domain Credentials141
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                  Virtualization/Sandbox Evasion
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                  Process Injection
                  Proc Filesystem1
                  System Network Configuration Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1500931 Sample: Catalina - Particulars.pdf.... Startdate: 29/08/2024 Architecture: WINDOWS Score: 100 24 beirutrest.com 2->24 26 api.ipify.org 2->26 32 Found malware configuration 2->32 34 Malicious sample detected (through community Yara rule) 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 13 other signatures 2->38 8 Catalina - Particulars.pdf.scr.exe 4 2->8         started        signatures3 process4 file5 22 C:\...\Catalina - Particulars.pdf.scr.exe.log, ASCII 8->22 dropped 40 Adds a directory exclusion to Windows Defender 8->40 42 Injects a PE file into a foreign processes 8->42 12 Catalina - Particulars.pdf.scr.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        18 Catalina - Particulars.pdf.scr.exe 8->18         started        signatures6 process7 dnsIp8 28 beirutrest.com 50.87.144.157, 21, 49734 UNIFIEDLAYER-AS-1US United States 12->28 30 api.ipify.org 172.67.74.152, 443, 49732 CLOUDFLARENETUS United States 12->30 44 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->44 46 Tries to steal Mail credentials (via file / registry access) 12->46 48 Tries to harvest and steal ftp login credentials 12->48 50 Tries to harvest and steal browser information (history, passwords, etc) 12->50 52 Loading BitLocker PowerShell Module 16->52 20 conhost.exe 16->20         started        signatures9 process10

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Catalina - Particulars.pdf.scr.exe29%ReversingLabsByteCode-MSIL.Trojan.Generic
                  Catalina - Particulars.pdf.scr.exe35%VirustotalBrowse
                  Catalina - Particulars.pdf.scr.exe100%AviraHEUR/AGEN.1306920
                  Catalina - Particulars.pdf.scr.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  beirutrest.com4%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  https://api.ipify.org/0%URL Reputationsafe
                  http://www.fontbureau.com0%URL Reputationsafe
                  http://www.fontbureau.com/designersG0%URL Reputationsafe
                  http://www.fontbureau.com/designers/?0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://www.fontbureau.com/designers?0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://www.fontbureau.com/designers0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  https://api.ipify.org/t0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  https://api.ipify.org0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.fontbureau.com/designers80%URL Reputationsafe
                  http://www.fonts.com0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.microsoft.c0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                  http://beirutrest.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  beirutrest.com
                  50.87.144.157
                  truetrueunknown
                  api.ipify.org
                  172.67.74.152
                  truefalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.fontbureau.comCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersGCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/bTheCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.tiro.comCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designersCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.goodfont.co.krCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tCatalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.carterandcone.comlCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sajatypeworks.comCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.typography.netDCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/cabarga.htmlNCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cn/cTheCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/staff/dennis.htmCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.orgCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.founder.com.cn/cnCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/frere-user.htmlCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.jiyu-kobo.co.jp/Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.galapagosdesign.com/DPleaseCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers8Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fonts.comCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sandoll.co.krCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.microsoft.cCatalina - Particulars.pdf.scr.exe, 00000005.00000002.4102529284.0000000006263000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.urwpp.deDPleaseCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.zhongyicts.com.cnCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1668490592.000000000270E000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.0000000002951000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.sakkal.comCatalina - Particulars.pdf.scr.exe, 00000000.00000002.1673451733.0000000006862000.00000004.00000800.00020000.00000000.sdmp, Catalina - Particulars.pdf.scr.exe, 00000000.00000002.1673312818.0000000005054000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://beirutrest.comCatalina - Particulars.pdf.scr.exe, 00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    50.87.144.157
                    beirutrest.comUnited States
                    46606UNIFIEDLAYER-AS-1UStrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1500931
                    Start date and time:2024-08-29 06:22:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 8m 9s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:10
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:Catalina - Particulars.pdf.scr.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@8/6@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 165
                    • Number of non-executed functions: 16
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    00:22:55API Interceptor8977759x Sleep call for process: Catalina - Particulars.pdf.scr.exe modified
                    00:22:56API Interceptor10x Sleep call for process: powershell.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    50.87.144.157Port Agency Appointment - VELOS ONYX.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                      UNITY SAKURA - VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                        BGC-2024-EST-001 & BGC-2024-DST-003.xlsx.scr.exeGet hashmaliciousAgentTeslaBrowse
                          V022.20.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                            E_QUOT_XLS_45-ELC205049A_P930M.xls.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                              D121-D122-D123-D127-D128-D130-23-8-2024.xls.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                MT.Hunter - Vessel's Details.doc.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  MV Catalina Particulars.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    AQUAVITA AIM - VSL's PARTICULARS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                      MV KAI RUI - TC PARTICULARS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        172.67.74.152zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                        • api.ipify.org/
                                        FormPlayer.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        PandaClient.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        golang-modules.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        SecuriteInfo.com.Trojan.Win64.Agent.14415.19839.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                        • api.ipify.org/?format=wef
                                        K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        beirutrest.comPort Agency Appointment - VELOS ONYX.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 50.87.144.157
                                        UNITY SAKURA - VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 50.87.144.157
                                        BGC-2024-EST-001 & BGC-2024-DST-003.xlsx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 50.87.144.157
                                        V022.20.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        • 50.87.144.157
                                        E_QUOT_XLS_45-ELC205049A_P930M.xls.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        • 50.87.144.157
                                        D121-D122-D123-D127-D128-D130-23-8-2024.xls.scr.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        • 50.87.144.157
                                        MT.Hunter - Vessel's Details.doc.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 50.87.144.157
                                        MV Catalina Particulars.pdf.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 50.87.144.157
                                        AQUAVITA AIM - VSL's PARTICULARS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 50.87.144.157
                                        MV KAI RUI - TC PARTICULARS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 50.87.144.157
                                        api.ipify.orgSecuriteInfo.com.BackDoor.SpyBotNET.62.13095.12836.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        rARKMONEY.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        z55enyioma.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        https://request-label-13956753.pages.dev/help/contact/135346556695032Get hashmaliciousUnknownBrowse
                                        • 104.26.13.205
                                        file.exeGet hashmaliciousMeduza StealerBrowse
                                        • 104.26.12.205
                                        file.exeGet hashmaliciousMeduza StealerBrowse
                                        • 104.26.12.205
                                        1C24TDH_00017388.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        Revised PI 28 08 2024.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        Port Agency Appointment - VELOS ONYX.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        UNITY SAKURA - VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.13.205
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        UNIFIEDLAYER-AS-1USrRFQ.bat.exeGet hashmaliciousFormBookBrowse
                                        • 162.241.226.190
                                        http://pxe.wvs.mybluehost.me/wise/number-account-854630/pages/login.phpGet hashmaliciousUnknownBrowse
                                        • 50.87.253.221
                                        28082024.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 69.49.245.172
                                        https://shorturl.at/1l4XwGet hashmaliciousHTMLPhisherBrowse
                                        • 69.49.230.198
                                        https://assets-usa.mkt.dynamics.com/c9f731e3-0864-ef11-a66d-6045bd003021/digitalassets/standaloneforms/0424cf3e-7364-ef11-bfe2-6045bd055762Get hashmaliciousHTMLPhisherBrowse
                                        • 162.241.61.243
                                        REQUEST FOR QUOTATION.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        • 162.240.81.18
                                        mbda-us.comAudiowav012.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 69.49.245.172
                                        mbda-us.comAudiowav012.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 69.49.245.172
                                        factura-630.900.exeGet hashmaliciousFormBookBrowse
                                        • 162.241.226.190
                                        External VM-Transcript Caller Left 3 CALLMSGS 000047Secs 2808.eml.msgGet hashmaliciousHTMLPhisherBrowse
                                        • 192.185.155.179
                                        CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        SecuriteInfo.com.BackDoor.SpyBotNET.62.13095.12836.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        Payment Advice.exeGet hashmaliciousFormBookBrowse
                                        • 172.67.210.102
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        vYhaKbJF08.exeGet hashmaliciousLummaCBrowse
                                        • 104.21.16.74
                                        file.exeGet hashmaliciousLummaC, VidarBrowse
                                        • 172.67.146.35
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.BackDoor.SpyBotNET.62.13095.12836.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 172.67.74.152
                                        pop.vbsGet hashmaliciousRemcosBrowse
                                        • 172.67.74.152
                                        rVAKIFBANK-#U00d6demeonaymakbuzu20240826.pdf.exeGet hashmaliciousQuasarBrowse
                                        • 172.67.74.152
                                        rARKMONEY.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        • 172.67.74.152
                                        z55enyioma.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        http://identifier-vous456.wixsite.com/my-site/Get hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        https://1113a6f.netsolhost.com/Get hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        http://pub-0c5198abed8c43b8a5e3815e602f4134.r2.dev/index.htmlGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        https://allegro-2000.com/Get hashmaliciousHTMLPhisherBrowse
                                        • 172.67.74.152
                                        No context
                                        Process:C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):1172
                                        Entropy (8bit):5.357042452875322
                                        Encrypted:false
                                        SSDEEP:24:3CytZWSKco4KmBs4RPT6BmFoUvjKTIKo+mZ9t7J0gt/NKIl9r+q:yyjWSU4y4RQmFoULF+mZ9tK8ND3
                                        MD5:BC894E0E69EAD6F64CC0BFF166F83F23
                                        SHA1:65063E8805372A43257A83D40C6E7930455C90DC
                                        SHA-256:3B679E4D4B2EFDA38EE03812504F85E8EAF16282EFA53A244744ECF73E7F72BA
                                        SHA-512:A536B90221FF9C74FA83A52E7617D7D352B88EA164B3ABF92BBCAFA08AE62836A9D5A759B1610E16F97305C0128E97E0EE282DACFD424ACB34CE1F9186008869
                                        Malicious:false
                                        Reputation:low
                                        Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.969919090949514
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:Catalina - Particulars.pdf.scr.exe
                                        File size:671'744 bytes
                                        MD5:316329f616d991c23b6718ba353a6b3a
                                        SHA1:01afaeed5a260c3909b2e14041cee23923c2d6d3
                                        SHA256:eec4404be651d77865707efa282ec7899a97550ad25351a70a926679f6b34bdf
                                        SHA512:11b6b1f028d0599c0e331a0f555a8d17535e059e02182408783608cc2591c9743695421c665ffdcc0ac762b4b1ac42922c398aedfa56e69a41b5164a43505480
                                        SSDEEP:12288:2VV01VtaNZppBYZ7PtuNfBwEExso1I5FSL3G4YTdO:4mVtozp2Z7PMNeEExsj58L24U
                                        TLSH:ABE423A04188EF60DAFD26F8F18A88A09732209F6954D3592CDEA1DD4D977600F7376F
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............0.."..........zA... ...`....@.. ....................................@................................
                                        Icon Hash:cd4c022d219a9901
                                        Entrypoint:0x4a417a
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66CFE184 [Thu Aug 29 02:48:36 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa41280x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa60000x1924.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xa80000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xa21800xa2200ed70c45ed531d21df076019f659e374eFalse0.9734664128758674data7.976543607556141IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xa60000x19240x1a006f56c9fed9bb02427f3adb99281a929bFalse0.8198617788461539data7.124100577179178IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xa80000xc0x200cde0779d2bc9453439e592afce82f51fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0xa61000x12c4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9708576186511241
                                        RT_GROUP_ICON0xa73d40x14data1.05
                                        RT_VERSION0xa73f80x32cdata0.42857142857142855
                                        RT_MANIFEST0xa77340x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 29, 2024 06:22:57.570513964 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:57.570563078 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:57.570631981 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:57.577034950 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:57.577050924 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.062398911 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.062473059 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:58.095783949 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:58.095834970 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.096220970 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.137485981 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:58.177282095 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:58.224529982 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.283926010 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.283987999 CEST44349732172.67.74.152192.168.2.4
                                        Aug 29, 2024 06:22:58.284055948 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:58.290056944 CEST49732443192.168.2.4172.67.74.152
                                        Aug 29, 2024 06:22:59.068094969 CEST4973421192.168.2.450.87.144.157
                                        Aug 29, 2024 06:22:59.073075056 CEST214973450.87.144.157192.168.2.4
                                        Aug 29, 2024 06:22:59.073188066 CEST4973421192.168.2.450.87.144.157
                                        Aug 29, 2024 06:22:59.077178955 CEST4973421192.168.2.450.87.144.157
                                        Aug 29, 2024 06:22:59.284342051 CEST214973450.87.144.157192.168.2.4
                                        Aug 29, 2024 06:22:59.284358978 CEST214973450.87.144.157192.168.2.4
                                        Aug 29, 2024 06:22:59.284431934 CEST4973421192.168.2.450.87.144.157
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 29, 2024 06:22:57.558995962 CEST5239653192.168.2.41.1.1.1
                                        Aug 29, 2024 06:22:57.566107035 CEST53523961.1.1.1192.168.2.4
                                        Aug 29, 2024 06:22:58.904083014 CEST5665153192.168.2.41.1.1.1
                                        Aug 29, 2024 06:22:59.067236900 CEST53566511.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Aug 29, 2024 06:22:57.558995962 CEST192.168.2.41.1.1.10xbe2cStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                        Aug 29, 2024 06:22:58.904083014 CEST192.168.2.41.1.1.10x753fStandard query (0)beirutrest.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Aug 29, 2024 06:22:57.566107035 CEST1.1.1.1192.168.2.40xbe2cNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                        Aug 29, 2024 06:22:57.566107035 CEST1.1.1.1192.168.2.40xbe2cNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                        Aug 29, 2024 06:22:57.566107035 CEST1.1.1.1192.168.2.40xbe2cNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                        Aug 29, 2024 06:22:59.067236900 CEST1.1.1.1192.168.2.40x753fNo error (0)beirutrest.com50.87.144.157A (IP address)IN (0x0001)false
                                        • api.ipify.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449732172.67.74.1524435856C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe
                                        TimestampBytes transferredDirectionData
                                        2024-08-29 04:22:58 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-08-29 04:22:58 UTC211INHTTP/1.1 200 OK
                                        Date: Thu, 29 Aug 2024 04:22:58 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8ba9c355edbb19ef-EWR
                                        2024-08-29 04:22:58 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:00:22:54
                                        Start date:29/08/2024
                                        Path:C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                                        Imagebase:0x260000
                                        File size:671'744 bytes
                                        MD5 hash:316329F616D991C23B6718BA353A6B3A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1669471296.00000000036A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:00:22:55
                                        Start date:29/08/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                                        Imagebase:0x2c0000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:00:22:55
                                        Start date:29/08/2024
                                        Path:C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                                        Imagebase:0x2d0000
                                        File size:671'744 bytes
                                        MD5 hash:316329F616D991C23B6718BA353A6B3A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:00:22:55
                                        Start date:29/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:5
                                        Start time:00:22:55
                                        Start date:29/08/2024
                                        Path:C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Catalina - Particulars.pdf.scr.exe"
                                        Imagebase:0x5a0000
                                        File size:671'744 bytes
                                        MD5 hash:316329F616D991C23B6718BA353A6B3A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.4098954296.00000000029C7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.4097386384.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.4098954296.00000000029A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.4%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:12.3%
                                          Total number of Nodes:285
                                          Total number of Limit Nodes:23
                                          execution_graph 47554 6e24ef0 47555 6e2507b 47554->47555 47557 6e24f16 47554->47557 47557->47555 47558 6e233fc 47557->47558 47559 6e25170 PostMessageW 47558->47559 47561 6e251dc 47559->47561 47561->47557 47232 6e22921 47237 6e22854 47232->47237 47233 6e22863 47237->47233 47238 6e23c73 47237->47238 47259 6e23c80 47237->47259 47280 6e23cd0 47237->47280 47240 6e23c7c 47238->47240 47239 6e23ca2 47239->47237 47240->47239 47302 6e24343 47240->47302 47307 6e2485f 47240->47307 47313 6e24658 47240->47313 47318 6e2429b 47240->47318 47323 6e24597 47240->47323 47327 6e24256 47240->47327 47338 6e24731 47240->47338 47347 6e23fb0 47240->47347 47353 6e23fd0 47240->47353 47359 6e24193 47240->47359 47365 6e247e9 47240->47365 47370 6e243eb 47240->47370 47380 6e2438a 47240->47380 47384 6e2420a 47240->47384 47393 6e243e5 47240->47393 47407 6e24525 47240->47407 47412 6e24941 47240->47412 47418 6e23fa0 47240->47418 47261 6e23c9a 47259->47261 47260 6e23ca2 47260->47237 47261->47260 47262 6e24343 2 API calls 47261->47262 47263 6e23fa0 2 API calls 47261->47263 47264 6e24941 3 API calls 47261->47264 47265 6e24525 2 API calls 47261->47265 47266 6e243e5 8 API calls 47261->47266 47267 6e2420a 4 API calls 47261->47267 47268 6e2438a 2 API calls 47261->47268 47269 6e243eb 6 API calls 47261->47269 47270 6e247e9 2 API calls 47261->47270 47271 6e24193 2 API calls 47261->47271 47272 6e23fd0 2 API calls 47261->47272 47273 6e23fb0 2 API calls 47261->47273 47274 6e24731 4 API calls 47261->47274 47275 6e24256 6 API calls 47261->47275 47276 6e24597 2 API calls 47261->47276 47277 6e2429b 2 API calls 47261->47277 47278 6e24658 2 API calls 47261->47278 47279 6e2485f 3 API calls 47261->47279 47262->47260 47263->47260 47264->47260 47265->47260 47266->47260 47267->47260 47268->47260 47269->47260 47270->47260 47271->47260 47272->47260 47273->47260 47274->47260 47275->47260 47276->47260 47277->47260 47278->47260 47279->47260 47281 6e23ca9 47280->47281 47282 6e23cda 47280->47282 47283 6e24343 2 API calls 47281->47283 47284 6e23fa0 2 API calls 47281->47284 47285 6e24941 3 API calls 47281->47285 47286 6e24525 2 API calls 47281->47286 47287 6e243e5 8 API calls 47281->47287 47288 6e2420a 4 API calls 47281->47288 47289 6e2438a 2 API calls 47281->47289 47290 6e243eb 6 API calls 47281->47290 47291 6e247e9 2 API calls 47281->47291 47292 6e24193 2 API calls 47281->47292 47293 6e23fd0 2 API calls 47281->47293 47294 6e23fb0 2 API calls 47281->47294 47295 6e24731 4 API calls 47281->47295 47296 6e24256 6 API calls 47281->47296 47297 6e24597 2 API calls 47281->47297 47298 6e2429b 2 API calls 47281->47298 47299 6e24658 2 API calls 47281->47299 47300 6e2485f 3 API calls 47281->47300 47301 6e23ca2 47281->47301 47282->47237 47283->47301 47284->47301 47285->47301 47286->47301 47287->47301 47288->47301 47289->47301 47290->47301 47291->47301 47292->47301 47293->47301 47294->47301 47295->47301 47296->47301 47297->47301 47298->47301 47299->47301 47300->47301 47301->47237 47303 6e24349 47302->47303 47303->47239 47304 6e24b1c 47303->47304 47424 6e221b0 47303->47424 47428 6e221a8 47303->47428 47308 6e24963 47307->47308 47432 6e2229f 47308->47432 47436 6e22298 47308->47436 47440 6e222a0 47308->47440 47309 6e24985 47314 6e24661 47313->47314 47316 6e221b0 WriteProcessMemory 47314->47316 47317 6e221a8 WriteProcessMemory 47314->47317 47315 6e248f1 47316->47315 47317->47315 47319 6e242a1 47318->47319 47444 6e21f61 47319->47444 47448 6e21f68 47319->47448 47320 6e242c7 47320->47239 47452 6e22010 47323->47452 47456 6e22018 47323->47456 47324 6e245b1 47324->47239 47328 6e24270 47327->47328 47329 6e23fb0 2 API calls 47328->47329 47333 6e24212 47328->47333 47332 6e24200 47329->47332 47330 6e2478c 47330->47239 47331 6e242c7 47331->47239 47332->47330 47332->47333 47460 6e220f0 47332->47460 47464 6e220e9 47332->47464 47333->47331 47336 6e21f61 ResumeThread 47333->47336 47337 6e21f68 ResumeThread 47333->47337 47336->47331 47337->47331 47343 6e220f0 VirtualAllocEx 47338->47343 47344 6e220e9 VirtualAllocEx 47338->47344 47339 6e24200 47339->47338 47340 6e2478c 47339->47340 47341 6e24212 47339->47341 47342 6e242c7 47341->47342 47345 6e21f61 ResumeThread 47341->47345 47346 6e21f68 ResumeThread 47341->47346 47342->47239 47343->47339 47344->47339 47345->47342 47346->47342 47349 6e23fac 47347->47349 47348 6e240c7 47348->47239 47349->47239 47349->47347 47349->47348 47468 6e22438 47349->47468 47472 6e2242d 47349->47472 47354 6e23fac 47353->47354 47354->47239 47355 6e240c7 47354->47355 47357 6e22438 CreateProcessA 47354->47357 47358 6e2242d CreateProcessA 47354->47358 47355->47239 47356 6e241d5 47356->47239 47357->47356 47358->47356 47361 6e240ba 47359->47361 47360 6e240c7 47360->47239 47361->47360 47363 6e22438 CreateProcessA 47361->47363 47364 6e2242d CreateProcessA 47361->47364 47362 6e241d5 47362->47239 47363->47362 47364->47362 47366 6e242b3 47365->47366 47368 6e21f61 ResumeThread 47366->47368 47369 6e21f68 ResumeThread 47366->47369 47367 6e242c7 47367->47239 47368->47367 47369->47367 47371 6e23fb0 2 API calls 47370->47371 47372 6e24200 47371->47372 47373 6e24212 47372->47373 47374 6e2478c 47372->47374 47376 6e220f0 VirtualAllocEx 47372->47376 47377 6e220e9 VirtualAllocEx 47372->47377 47375 6e242c7 47373->47375 47378 6e21f61 ResumeThread 47373->47378 47379 6e21f68 ResumeThread 47373->47379 47375->47239 47376->47372 47377->47372 47378->47375 47379->47375 47382 6e221b0 WriteProcessMemory 47380->47382 47383 6e221a8 WriteProcessMemory 47380->47383 47381 6e243b8 47381->47239 47382->47381 47383->47381 47385 6e24200 47384->47385 47386 6e2478c 47385->47386 47387 6e24212 47385->47387 47389 6e220f0 VirtualAllocEx 47385->47389 47390 6e220e9 VirtualAllocEx 47385->47390 47388 6e242c7 47387->47388 47391 6e21f61 ResumeThread 47387->47391 47392 6e21f68 ResumeThread 47387->47392 47388->47239 47389->47385 47390->47385 47391->47388 47392->47388 47394 6e249d5 47393->47394 47403 6e22010 Wow64SetThreadContext 47394->47403 47404 6e22018 Wow64SetThreadContext 47394->47404 47395 6e249f0 47396 6e23fb0 2 API calls 47395->47396 47397 6e24200 47396->47397 47398 6e24212 47397->47398 47399 6e2478c 47397->47399 47401 6e220f0 VirtualAllocEx 47397->47401 47402 6e220e9 VirtualAllocEx 47397->47402 47400 6e242c7 47398->47400 47405 6e21f61 ResumeThread 47398->47405 47406 6e21f68 ResumeThread 47398->47406 47400->47239 47401->47397 47402->47397 47403->47395 47404->47395 47405->47400 47406->47400 47409 6e24544 47407->47409 47408 6e24b1c 47409->47239 47409->47408 47410 6e221b0 WriteProcessMemory 47409->47410 47411 6e221a8 WriteProcessMemory 47409->47411 47410->47409 47411->47409 47413 6e2495c 47412->47413 47414 6e24985 47413->47414 47415 6e222a0 ReadProcessMemory 47413->47415 47416 6e22298 ReadProcessMemory 47413->47416 47417 6e2229f ReadProcessMemory 47413->47417 47415->47414 47416->47414 47417->47414 47420 6e23fa4 47418->47420 47419 6e240c7 47419->47239 47420->47239 47420->47419 47422 6e22438 CreateProcessA 47420->47422 47423 6e2242d CreateProcessA 47420->47423 47421 6e241d5 47421->47239 47422->47421 47423->47421 47425 6e221b2 WriteProcessMemory 47424->47425 47427 6e2224f 47425->47427 47427->47303 47429 6e221ac WriteProcessMemory 47428->47429 47431 6e2224f 47429->47431 47431->47303 47433 6e222a0 ReadProcessMemory 47432->47433 47435 6e2232f 47433->47435 47435->47309 47437 6e2229c ReadProcessMemory 47436->47437 47439 6e2232f 47437->47439 47439->47309 47441 6e222eb ReadProcessMemory 47440->47441 47443 6e2232f 47441->47443 47443->47309 47445 6e21f68 ResumeThread 47444->47445 47447 6e21fd9 47445->47447 47447->47320 47449 6e21f6e ResumeThread 47448->47449 47451 6e21fd9 47449->47451 47451->47320 47453 6e22018 Wow64SetThreadContext 47452->47453 47455 6e220a5 47453->47455 47455->47324 47457 6e2201e Wow64SetThreadContext 47456->47457 47459 6e220a5 47457->47459 47459->47324 47461 6e22130 VirtualAllocEx 47460->47461 47463 6e2216d 47461->47463 47463->47332 47465 6e22130 VirtualAllocEx 47464->47465 47467 6e2216d 47465->47467 47467->47332 47469 6e224c1 47468->47469 47469->47469 47470 6e22626 CreateProcessA 47469->47470 47471 6e22683 47470->47471 47471->47471 47473 6e22434 CreateProcessA 47472->47473 47475 6e22683 47473->47475 47475->47475 47476 4bb3d78 47477 4bb3dbe GetCurrentProcess 47476->47477 47479 4bb3e09 47477->47479 47480 4bb3e10 GetCurrentThread 47477->47480 47479->47480 47481 4bb3e4d GetCurrentProcess 47480->47481 47482 4bb3e46 47480->47482 47483 4bb3e83 47481->47483 47482->47481 47484 4bb3eab GetCurrentThreadId 47483->47484 47485 4bb3edc 47484->47485 47486 7227a68 47487 7227a7a 47486->47487 47488 7227a90 47486->47488 47490 7226014 47487->47490 47491 722601f 47490->47491 47492 7227ee6 47491->47492 47495 7228e20 47491->47495 47500 7228e30 47491->47500 47492->47488 47496 7228e15 47495->47496 47497 7228e27 47495->47497 47496->47491 47497->47496 47505 7226140 47497->47505 47502 7228e51 47500->47502 47501 7228e66 47501->47491 47502->47501 47503 7226140 DrawTextExW 47502->47503 47504 7228eb6 47503->47504 47506 722614b 47505->47506 47509 722980c 47506->47509 47508 7228eb6 47511 7229817 47509->47511 47510 722a4c1 47510->47508 47511->47510 47515 722af22 47511->47515 47518 722af30 47511->47518 47512 722a5c5 47512->47508 47521 72299d4 47515->47521 47519 722af4d 47518->47519 47520 72299d4 DrawTextExW 47518->47520 47519->47512 47520->47519 47522 722af68 DrawTextExW 47521->47522 47524 722af4d 47522->47524 47524->47512 47525 9fd1d4 47526 9fd1ec 47525->47526 47530 9fd246 47526->47530 47532 4bb86e8 47526->47532 47536 4bb68bc 47526->47536 47540 4bb9448 47526->47540 47544 4bb86d8 47526->47544 47533 4bb870e 47532->47533 47534 4bb68bc CallWindowProcW 47533->47534 47535 4bb872f 47534->47535 47535->47530 47537 4bb68c7 47536->47537 47539 4bb94a9 47537->47539 47548 4bb69e4 CallWindowProcW 47537->47548 47542 4bb9485 47540->47542 47543 4bb94a9 47542->47543 47549 4bb69e4 CallWindowProcW 47542->47549 47545 4bb870e 47544->47545 47546 4bb68bc CallWindowProcW 47545->47546 47547 4bb872f 47546->47547 47547->47530 47548->47539 47549->47543 47550 4bb8530 47551 4bb8598 CreateWindowExW 47550->47551 47553 4bb8654 47551->47553 47562 4bbaad0 47563 4bbabec 47562->47563 47564 4bbab42 47562->47564 47566 4bb68bc CallWindowProcW 47563->47566 47565 4bbab9a CallWindowProcW 47564->47565 47567 4bbab49 47564->47567 47565->47567 47566->47567 47589 4bb3fc0 DuplicateHandle 47590 4bb4056 47589->47590 47568 c54668 47569 c5467a 47568->47569 47570 c54686 47569->47570 47572 c54778 47569->47572 47573 c5479d 47572->47573 47577 c54888 47573->47577 47581 c54878 47573->47581 47579 c548af 47577->47579 47578 c5498c 47578->47578 47579->47578 47585 c5449c 47579->47585 47582 c548af 47581->47582 47583 c5498c 47582->47583 47584 c5449c CreateActCtxA 47582->47584 47584->47583 47586 c55918 CreateActCtxA 47585->47586 47588 c559db 47586->47588

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 4bbdfb8-4bbdfe4 528 4bbdfeb-4bbe258 call 4bbdd8c call 4bbdd9c call 4bbddac * 2 call 4bbddbc call 4bbddcc call 4bbdddc 527->528 529 4bbdfe6 527->529 568 4bbe279-4bbe28d 528->568 529->528 569 4bbe25a-4bbe267 568->569 570 4bbe28f-4bbe295 568->570 571 4bbe269 569->571 572 4bbe26e-4bbe276 569->572 573 4bbe371-4bbe385 570->573 571->572 572->568 574 4bbe38b-4bbe39f 573->574 575 4bbe29a-4bbe2b2 573->575 576 4bbe555-4bbe56c 574->576 582 4bbe2bf-4bbe2c2 575->582 583 4bbe2b4-4bbe2b6 575->583 577 4bbe56e 576->577 578 4bbe574-4bbe576 576->578 580 4bbe578 577->580 581 4bbe570-4bbe572 577->581 584 4bbe57d-4bbe58c 578->584 580->584 581->578 581->580 587 4bbe2c9-4bbe2cf 582->587 588 4bbe2c4 582->588 589 4bbe2b8 583->589 590 4bbe2bd 583->590 585 4bbe592-4bbe73b call 4bbddec call 4bbddfc call 4bbde0c call 4bb46bc * 2 call 4bb0990 call 4bbde1c 584->585 586 4bbe3a4-4bbe3c2 584->586 893 4bbe73d call 7225080 585->893 894 4bbe73d call 7225090 585->894 593 4bbe3c9-4bbe3e3 586->593 594 4bbe3c4 586->594 591 4bbe2d1 587->591 592 4bbe2d6-4bbe2f0 587->592 588->587 589->590 590->587 591->592 596 4bbe2f2 592->596 597 4bbe2f7-4bbe311 592->597 598 4bbe3ea-4bbe3fd 593->598 599 4bbe3e5 593->599 594->593 596->597 603 4bbe318-4bbe32b 597->603 604 4bbe313 597->604 600 4bbe3ff 598->600 601 4bbe404-4bbe417 598->601 599->598 600->601 605 4bbe419 601->605 606 4bbe41e-4bbe431 601->606 608 4bbe32d 603->608 609 4bbe332-4bbe345 603->609 604->603 605->606 612 4bbe438-4bbe444 606->612 613 4bbe433 606->613 608->609 610 4bbe34c-4bbe35f 609->610 611 4bbe347 609->611 614 4bbe361 610->614 615 4bbe366-4bbe36e 610->615 611->610 617 4bbe453-4bbe457 612->617 618 4bbe446-4bbe44a 612->618 613->612 614->615 615->573 621 4bbe459 617->621 622 4bbe45e-4bbe464 617->622 619 4bbe44c 618->619 620 4bbe451 618->620 619->620 620->622 621->622 623 4bbe46b-4bbe47f 622->623 624 4bbe466 622->624 626 4bbe481 623->626 627 4bbe486-4bbe496 623->627 624->623 626->627 629 4bbe498 627->629 630 4bbe49d-4bbe4bc 627->630 629->630 632 4bbe4be 630->632 633 4bbe4c3-4bbe4d9 630->633 632->633 635 4bbe4db-4bbe4df 633->635 636 4bbe4e8-4bbe4ec 633->636 639 4bbe4e1 635->639 640 4bbe4e6 635->640 637 4bbe4ee 636->637 638 4bbe4f3-4bbe529 636->638 637->638 645 4bbe52b 638->645 646 4bbe530-4bbe554 638->646 639->640 640->638 645->646 646->576 662 4bbe743-4bbe968 call 4bbde2c call 4bbde3c call 4bbde4c call 4bb0990 call 4bbde5c call 4bbde6c call 4bbde7c call 4bb58d0 686 4bbe96a-4bbe976 662->686 687 4bbe992 662->687 689 4bbe978-4bbe97e 686->689 690 4bbe980-4bbe986 686->690 688 4bbe998-4bbeabb call 4bbde8c call 4bbde9c call 4bb0990 687->688 705 4bbeabd-4bbeac9 688->705 706 4bbead7 688->706 691 4bbe990 689->691 690->691 691->688 707 4bbeacb-4bbead1 705->707 708 4bbead3 705->708 709 4bbeadd-4bbeb82 706->709 710 4bbead5 707->710 708->710 716 4bbeb89-4bbeba9 709->716 717 4bbeb84 709->717 710->709 719 4bbebab 716->719 720 4bbebb0-4bbec9b 716->720 717->716 719->720 729 4bbeca2-4bbf1fb call 4bbde9c call 4bb0990 call 4bbdeac call 4bbde9c call 4bb0990 call 4bbdeac call 4bbde9c call 4bb0990 call 4bbde9c call 4bb0990 call 4bbde2c call 4bbde3c call 4bb0990 call 4bbde5c call 4bbde6c call 4bbdebc call 4bbdecc call 4bbde2c 720->729 787 4bbf1fd 729->787 788 4bbf202-4bbf288 729->788 787->788 792 4bbf28a 788->792 793 4bbf28f-4bbf3b2 call 4bbdedc call 4bbde3c call 4bb0990 call 4bbde5c call 4bbde6c call 4bbdeec 788->793 792->793 808 4bbf3b9-4bbf8a8 call 4bbdefc call 4bbde2c call 4bbde3c call 4bb0990 call 4bbde5c call 4bbde6c call 4bbdf0c call 4bbde2c call 4bbde3c call 4bb0990 call 4bbde5c call 4bbde6c call 4bbdf1c call 4bbdf2c call 4bb0990 call 4bbdf3c call 4bbdf4c * 5 793->808 809 4bbf3b4 793->809 869 4bbf8aa-4bbf8b6 808->869 870 4bbf8d2 808->870 809->808 871 4bbf8b8-4bbf8be 869->871 872 4bbf8c0-4bbf8c6 869->872 873 4bbf8d8-4bbf9d0 call 4bbdf5c call 4bbdf6c call 4bbde3c call 4bb4874 call 4bbdf7c call 4bb4874 call 4bbdf7c 870->873 874 4bbf8d0 871->874 872->874 874->873 893->662 894->662
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: d2e67e044c2889eb61bf517155dcee0c9cc866972a978e56996d7c4153e8deeb
                                          • Instruction ID: 5408f4a4b5e0f12a03bc805ac1ebb8fd47422816927f171350c855989fe4a626
                                          • Opcode Fuzzy Hash: d2e67e044c2889eb61bf517155dcee0c9cc866972a978e56996d7c4153e8deeb
                                          • Instruction Fuzzy Hash: DBF2C834A01619CFDB54DF68C884AE9B7B1FF89300F1186E9E449AB365DB74AE85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: 47679f79a2ff220e06a408839d77ad53cc711e898a9ebd3eb9f6dc09043848d2
                                          • Instruction ID: bd01eac66a3ae590538bd79a2ccbdc4e984dea95f3e54f85513e28d754c5f695
                                          • Opcode Fuzzy Hash: 47679f79a2ff220e06a408839d77ad53cc711e898a9ebd3eb9f6dc09043848d2
                                          • Instruction Fuzzy Hash: C2E2C534A01619CFDB54DF68C888AE9B7B1FF89300F1186E9E4496B361DB74AE85CF40
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $
                                          • API String ID: 0-3993045852
                                          • Opcode ID: 9bafab3317627280b485258c2662fe24a359f6df6cdba896b8ba1df6e1ba3378
                                          • Instruction ID: 4cb20bca8b06eda07357f33947cf954680c4cafd4de5ba308083c27440737a2b
                                          • Opcode Fuzzy Hash: 9bafab3317627280b485258c2662fe24a359f6df6cdba896b8ba1df6e1ba3378
                                          • Instruction Fuzzy Hash: 0D814971D0532ACFEB64CF66CC047E9BBB6AF89300F1491AAD509A7291DB705A85CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674541036.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7220000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b5265432097df14208c1dfd6f744f8785ec3b76db66f71e2e07085d3a790c500
                                          • Instruction ID: a5882a046b40ff7ca481cde78bbee3f6f41bc0e351c3bab504dc3974d096f546
                                          • Opcode Fuzzy Hash: b5265432097df14208c1dfd6f744f8785ec3b76db66f71e2e07085d3a790c500
                                          • Instruction Fuzzy Hash: D3A21775A102198FDB15DF68C8546EDB7B2FF89300F1482A9D90AA7351EB74AE81CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1cedc4dea1a112115f923006f7e4968fa600f19254003a5e17f34c5fefd5fb0
                                          • Instruction ID: 58cd6b4532ccbfb145349483922a0ccd5155aed09f8a2a1d952f7a6e351f38be
                                          • Opcode Fuzzy Hash: d1cedc4dea1a112115f923006f7e4968fa600f19254003a5e17f34c5fefd5fb0
                                          • Instruction Fuzzy Hash: E431F87480532ACFEBA4DF55D8447E8B7FABB09315F0461D9850EA3295C7715AC9CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 659e1e1e54e2e94a2ee2fe574c8398800a017769ca20de3612eea75c927c1fbe
                                          • Instruction ID: 5f010e12d4305ffd29350e5f3f4cf8b1c606e4fce55c13f0a4b8efb193358249
                                          • Opcode Fuzzy Hash: 659e1e1e54e2e94a2ee2fe574c8398800a017769ca20de3612eea75c927c1fbe
                                          • Instruction Fuzzy Hash: 09211DB0D062589FEB58DFA7C8453EEBFB6AFC9300F04C06AD50966264DB750945CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 10f73d096f24703bab513142d2c86505f2902f8b8c756b076492f370c491958f
                                          • Instruction ID: cf9b19e5c801f8162013e1a85eb61225d9689d7f36ad2f03941f7788268e4661
                                          • Opcode Fuzzy Hash: 10f73d096f24703bab513142d2c86505f2902f8b8c756b076492f370c491958f
                                          • Instruction Fuzzy Hash: F121F7B0D066188BEB58DFABC9443EEFAF7AFC8300F04C02AD50966264DB7509498F90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44fc2e20017219314db387a5a125d0193a05153b749904d3b6b109793b83e5ba
                                          • Instruction ID: 9120efa00947b28c7a4ab55bd7cce6d159ba667c952bb55b2ef7ba7b3e3192a0
                                          • Opcode Fuzzy Hash: 44fc2e20017219314db387a5a125d0193a05153b749904d3b6b109793b83e5ba
                                          • Instruction Fuzzy Hash: 2911E634805329CFEBA4DF65D9887E8BBF6AB09311F04719A840AA2295DB719EC5CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 02a5fd3b43d582402d9f35d7827b96922bf66fe0611bcb2adea6a01b6ee57771
                                          • Instruction ID: f35a14058b18259ed6c9ae4d01329b72258109c9d3f561c38fbb27241cbefbd8
                                          • Opcode Fuzzy Hash: 02a5fd3b43d582402d9f35d7827b96922bf66fe0611bcb2adea6a01b6ee57771
                                          • Instruction Fuzzy Hash: 7C111834809326CFEB94DF51D9847F8B7FAAB0A311F04719A840AA32D5CB719AC5CF40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 6c467b0-6c467ce 295 6c467f0-6c4683c 294->295 300 6c46843-6c4684a 295->300 301 6c46850-6c4685b 300->301 302 6c468d2-6c468d7 300->302 303 6c467d0-6c467d3 301->303 304 6c467d5 303->304 305 6c467dc-6c467ee 303->305 304->295 304->300 304->305 307 6c46860-6c46866 304->307 308 6c468a2-6c468a6 304->308 305->303 311 6c46868 307->311 312 6c4686a-6c46876 307->312 309 6c468c7 308->309 310 6c468a8-6c468b1 308->310 317 6c468ca-6c468d1 309->317 314 6c468b3-6c468b6 310->314 315 6c468b8-6c468bb 310->315 316 6c46878-6c46887 311->316 312->316 318 6c468c5 314->318 315->318 321 6c4689f 316->321 322 6c46889-6c4688f 316->322 318->317 321->308 323 6c46891 322->323 324 6c46893-6c46895 322->324 323->321 324->321
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8bq$8bq$LR^q$LR^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-471625051
                                          • Opcode ID: b624a6801d0bbe2c1e3867f78c2addb2213c175eb2aa4fbca01e7171cc78e46b
                                          • Instruction ID: b5ed53494c2e498a7270504469a94001894dc8f869c9537ed243aac1a60cb1ff
                                          • Opcode Fuzzy Hash: b624a6801d0bbe2c1e3867f78c2addb2213c175eb2aa4fbca01e7171cc78e46b
                                          • Instruction Fuzzy Hash: 17317070F00209DFEB44EBAAD455A6EBBB5EF8A311F10442AE206A7394DB709D458B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 325 4bb3d68-4bb3e07 GetCurrentProcess 330 4bb3e09-4bb3e0f 325->330 331 4bb3e10-4bb3e44 GetCurrentThread 325->331 330->331 332 4bb3e4d-4bb3e81 GetCurrentProcess 331->332 333 4bb3e46-4bb3e4c 331->333 334 4bb3e8a-4bb3ea5 call 4bb3f47 332->334 335 4bb3e83-4bb3e89 332->335 333->332 339 4bb3eab-4bb3eda GetCurrentThreadId 334->339 335->334 340 4bb3edc-4bb3ee2 339->340 341 4bb3ee3-4bb3f45 339->341 340->341
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 04BB3DF6
                                          • GetCurrentThread.KERNEL32 ref: 04BB3E33
                                          • GetCurrentProcess.KERNEL32 ref: 04BB3E70
                                          • GetCurrentThreadId.KERNEL32 ref: 04BB3EC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 3fa93e578321415c958354eac7c567ac1d62eff3fca7b8d9f88896125012116a
                                          • Instruction ID: 670bb4f058edb7ff4ee4fc6e5821053f63cf22bca9aee64d1cd74e8b356795b6
                                          • Opcode Fuzzy Hash: 3fa93e578321415c958354eac7c567ac1d62eff3fca7b8d9f88896125012116a
                                          • Instruction Fuzzy Hash: 125179B0900249DFDB04DFA9D948BEEBBF1EF48304F208559E449A7361D774A984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 348 4bb3d78-4bb3e07 GetCurrentProcess 352 4bb3e09-4bb3e0f 348->352 353 4bb3e10-4bb3e44 GetCurrentThread 348->353 352->353 354 4bb3e4d-4bb3e81 GetCurrentProcess 353->354 355 4bb3e46-4bb3e4c 353->355 356 4bb3e8a-4bb3ea5 call 4bb3f47 354->356 357 4bb3e83-4bb3e89 354->357 355->354 361 4bb3eab-4bb3eda GetCurrentThreadId 356->361 357->356 362 4bb3edc-4bb3ee2 361->362 363 4bb3ee3-4bb3f45 361->363 362->363
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 04BB3DF6
                                          • GetCurrentThread.KERNEL32 ref: 04BB3E33
                                          • GetCurrentProcess.KERNEL32 ref: 04BB3E70
                                          • GetCurrentThreadId.KERNEL32 ref: 04BB3EC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 1dccded5554f2c985107d1ebb40cc77678d3f4370a9488e8e1f422a5566552d9
                                          • Instruction ID: 435bb6f5a62c72289b25c39b5095fffba4a12cafbe7b16c6d6e257ab1259ce7d
                                          • Opcode Fuzzy Hash: 1dccded5554f2c985107d1ebb40cc77678d3f4370a9488e8e1f422a5566552d9
                                          • Instruction Fuzzy Hash: 7F5179B0900209DFDB14DFAAD948BEEBBF1EF48304F208559D449A7360C774A984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 370 6c45d41-6c45d78 371 6c45db1-6c45dd6 370->371 374 6c45dd8 371->374 375 6c45ddb-6c45e06 371->375 374->375 379 6c45d7a-6c45d7d 375->379 380 6c45d86-6c45daf 379->380 381 6c45d7f 379->381 380->379 381->371 381->380 382 6c45f55-6c45f78 381->382 383 6c45ed6-6c45f39 381->383 384 6c45e30-6c45e43 381->384 385 6c45ebe-6c45ec3 381->385 386 6c45e4e-6c45e86 381->386 387 6c45ec8-6c45ed1 381->387 388 6c45e8b-6c45eb4 381->388 389 6c45e0b-6c45e2b 381->389 406 6c45f90-6c45f97 382->406 407 6c45f7a-6c45f82 382->407 383->379 400 6c45e4c 384->400 385->379 386->379 387->379 388->385 389->379 400->386 407->406
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$$^q$$^q
                                          • API String ID: 0-3333519130
                                          • Opcode ID: 93055dccf991218a6b25dd0772c69c993fe583f341fab245b7c2c45603e23416
                                          • Instruction ID: 6a650aa411cf980a96b0c1abfc8fccdba979da40f195980bcb5bfdb26aa38068
                                          • Opcode Fuzzy Hash: 93055dccf991218a6b25dd0772c69c993fe583f341fab245b7c2c45603e23416
                                          • Instruction Fuzzy Hash: B651BD70E01605CFEB94EF69C949BAEB7F2FF45700F94846AE105EB2A5D7709940CB42

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 411 6c45a8f 412 6c45f4c-6c45f53 411->412 413 6c45d7a-6c45d7d 411->413 414 6c45f55-6c45f78 412->414 415 6c45f39 412->415 416 6c45d86-6c45daf 413->416 417 6c45d7f 413->417 443 6c45f90-6c45f97 414->443 444 6c45f7a-6c45f82 414->444 415->413 416->413 417->414 417->416 419 6c45ed6-6c45f34 417->419 420 6c45e30-6c45e43 417->420 421 6c45db1-6c45dc9 417->421 422 6c45ebe-6c45ec3 417->422 423 6c45e4e-6c45e86 417->423 424 6c45ec8-6c45ed1 417->424 425 6c45e8b-6c45eb4 417->425 426 6c45e0b-6c45e2b 417->426 419->415 437 6c45e4c 420->437 441 6c45dd4-6c45dd6 421->441 422->413 423->413 424->413 425->422 426->413 437->423 446 6c45dd8 441->446 447 6c45ddb-6c45e06 441->447 444->443 446->447 447->413
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$$^q$$^q
                                          • API String ID: 0-3333519130
                                          • Opcode ID: bab36629c5b91b93b37e54697065d26bbe880e07bd20545e1a3cb0c1cdb98fec
                                          • Instruction ID: 6fd0b05c9e62edbfb2714a5f7af783e44422dbb6db1f8c0af77a8f6661d93f0c
                                          • Opcode Fuzzy Hash: bab36629c5b91b93b37e54697065d26bbe880e07bd20545e1a3cb0c1cdb98fec
                                          • Instruction Fuzzy Hash: 4B41AC70F02605CFFB94EB59C948B6D77F2EF45701F9484AAE105AB2A1D734D980CB42

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1610 6e2242d-6e22432 1611 6e22434-6e22439 1610->1611 1612 6e2243a-6e224cd 1610->1612 1611->1612 1614 6e22506-6e22526 1612->1614 1615 6e224cf-6e224d9 1612->1615 1620 6e22528-6e22532 1614->1620 1621 6e2255f-6e2258e 1614->1621 1615->1614 1616 6e224db-6e224dd 1615->1616 1618 6e22500-6e22503 1616->1618 1619 6e224df-6e224e9 1616->1619 1618->1614 1622 6e224eb 1619->1622 1623 6e224ed-6e224fc 1619->1623 1620->1621 1624 6e22534-6e22536 1620->1624 1631 6e22590-6e2259a 1621->1631 1632 6e225c7-6e22681 CreateProcessA 1621->1632 1622->1623 1623->1623 1625 6e224fe 1623->1625 1626 6e22538-6e22542 1624->1626 1627 6e22559-6e2255c 1624->1627 1625->1618 1629 6e22546-6e22555 1626->1629 1630 6e22544 1626->1630 1627->1621 1629->1629 1633 6e22557 1629->1633 1630->1629 1631->1632 1634 6e2259c-6e2259e 1631->1634 1643 6e22683-6e22689 1632->1643 1644 6e2268a-6e22710 1632->1644 1633->1627 1635 6e225a0-6e225aa 1634->1635 1636 6e225c1-6e225c4 1634->1636 1638 6e225ae-6e225bd 1635->1638 1639 6e225ac 1635->1639 1636->1632 1638->1638 1640 6e225bf 1638->1640 1639->1638 1640->1636 1643->1644 1654 6e22712-6e22716 1644->1654 1655 6e22720-6e22724 1644->1655 1654->1655 1656 6e22718 1654->1656 1657 6e22726-6e2272a 1655->1657 1658 6e22734-6e22738 1655->1658 1656->1655 1657->1658 1659 6e2272c 1657->1659 1660 6e2273a-6e2273e 1658->1660 1661 6e22748-6e2274c 1658->1661 1659->1658 1660->1661 1662 6e22740 1660->1662 1663 6e2275e-6e22765 1661->1663 1664 6e2274e-6e22754 1661->1664 1662->1661 1665 6e22767-6e22776 1663->1665 1666 6e2277c 1663->1666 1664->1663 1665->1666 1668 6e2277d 1666->1668 1668->1668
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E2266E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 2bfeaa7edab1d8bb13b47b9169c979134f317775f8568711e813590fda235af3
                                          • Instruction ID: 35cd347ca898d1e25893750ec4753801dd771f561e85cd647bc5a7d8d387d2be
                                          • Opcode Fuzzy Hash: 2bfeaa7edab1d8bb13b47b9169c979134f317775f8568711e813590fda235af3
                                          • Instruction Fuzzy Hash: F5A19C70D0032ACFDB50CF68C8417EDBBB2BF48314F0481A9E908A7294DB749A85CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1669 6e22438-6e224cd 1671 6e22506-6e22526 1669->1671 1672 6e224cf-6e224d9 1669->1672 1677 6e22528-6e22532 1671->1677 1678 6e2255f-6e2258e 1671->1678 1672->1671 1673 6e224db-6e224dd 1672->1673 1675 6e22500-6e22503 1673->1675 1676 6e224df-6e224e9 1673->1676 1675->1671 1679 6e224eb 1676->1679 1680 6e224ed-6e224fc 1676->1680 1677->1678 1681 6e22534-6e22536 1677->1681 1688 6e22590-6e2259a 1678->1688 1689 6e225c7-6e22681 CreateProcessA 1678->1689 1679->1680 1680->1680 1682 6e224fe 1680->1682 1683 6e22538-6e22542 1681->1683 1684 6e22559-6e2255c 1681->1684 1682->1675 1686 6e22546-6e22555 1683->1686 1687 6e22544 1683->1687 1684->1678 1686->1686 1690 6e22557 1686->1690 1687->1686 1688->1689 1691 6e2259c-6e2259e 1688->1691 1700 6e22683-6e22689 1689->1700 1701 6e2268a-6e22710 1689->1701 1690->1684 1692 6e225a0-6e225aa 1691->1692 1693 6e225c1-6e225c4 1691->1693 1695 6e225ae-6e225bd 1692->1695 1696 6e225ac 1692->1696 1693->1689 1695->1695 1697 6e225bf 1695->1697 1696->1695 1697->1693 1700->1701 1711 6e22712-6e22716 1701->1711 1712 6e22720-6e22724 1701->1712 1711->1712 1713 6e22718 1711->1713 1714 6e22726-6e2272a 1712->1714 1715 6e22734-6e22738 1712->1715 1713->1712 1714->1715 1716 6e2272c 1714->1716 1717 6e2273a-6e2273e 1715->1717 1718 6e22748-6e2274c 1715->1718 1716->1715 1717->1718 1719 6e22740 1717->1719 1720 6e2275e-6e22765 1718->1720 1721 6e2274e-6e22754 1718->1721 1719->1718 1722 6e22767-6e22776 1720->1722 1723 6e2277c 1720->1723 1721->1720 1722->1723 1725 6e2277d 1723->1725 1725->1725
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E2266E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: bfdefdc37628fafe224ff3a0226987f289ac67be0c0cd8f7bf38f577fa941b27
                                          • Instruction ID: 369933e44441df4f5e0593c00193016649de857380dde4fd5855084d8e169f7b
                                          • Opcode Fuzzy Hash: bfdefdc37628fafe224ff3a0226987f289ac67be0c0cd8f7bf38f577fa941b27
                                          • Instruction Fuzzy Hash: B9918C71D0032ADFDB54CF68C8417EDBBB2BF48314F1481A9E908A7294DB749A85CF92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1726 4bb8524-4bb8596 1727 4bb8598-4bb859e 1726->1727 1728 4bb85a1-4bb85a8 1726->1728 1727->1728 1729 4bb85aa-4bb85b0 1728->1729 1730 4bb85b3-4bb85eb 1728->1730 1729->1730 1731 4bb85f3-4bb8652 CreateWindowExW 1730->1731 1732 4bb865b-4bb8693 1731->1732 1733 4bb8654-4bb865a 1731->1733 1737 4bb86a0 1732->1737 1738 4bb8695-4bb8698 1732->1738 1733->1732 1739 4bb86a1 1737->1739 1738->1737 1739->1739
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04BB8642
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: c4e1cf8564b301daee0731d118ca816d959ee61a499e2b649ffa4023c1bd5cd6
                                          • Instruction ID: e8e2dbfc01a50ca3639bbe4c9946dda759284512a2a469fac635e197d40db015
                                          • Opcode Fuzzy Hash: c4e1cf8564b301daee0731d118ca816d959ee61a499e2b649ffa4023c1bd5cd6
                                          • Instruction Fuzzy Hash: 3B51E0B1D00309EFDB14DFA9C884ADEBBB5FF48314F24852AE819AB210D775A841CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1848 4bb8530-4bb8596 1849 4bb8598-4bb859e 1848->1849 1850 4bb85a1-4bb85a8 1848->1850 1849->1850 1851 4bb85aa-4bb85b0 1850->1851 1852 4bb85b3-4bb8652 CreateWindowExW 1850->1852 1851->1852 1854 4bb865b-4bb8693 1852->1854 1855 4bb8654-4bb865a 1852->1855 1859 4bb86a0 1854->1859 1860 4bb8695-4bb8698 1854->1860 1855->1854 1861 4bb86a1 1859->1861 1860->1859 1861->1861
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04BB8642
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 7a3fe1722fba0fb5f5a76c076a2d83bcc9d5a23032cfd0909602699665906045
                                          • Instruction ID: 772c73efd0877759308ec90152558d209a97038abb726adf7ac9ea1bbbf94710
                                          • Opcode Fuzzy Hash: 7a3fe1722fba0fb5f5a76c076a2d83bcc9d5a23032cfd0909602699665906045
                                          • Instruction Fuzzy Hash: E641B0B1D103099FDB14DF99C984ADEBBB5FF48314F24852AE819AB210D771A845CF91
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04BBABC1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: b3dd4884f4a1b29ba75800c638fce5c573f7827fe106db9f286dc44de489584b
                                          • Instruction ID: 6cbb715900fbdcc80d7b0a49174dc94533a890e01b9e1d454ce164bbd1162aa9
                                          • Opcode Fuzzy Hash: b3dd4884f4a1b29ba75800c638fce5c573f7827fe106db9f286dc44de489584b
                                          • Instruction Fuzzy Hash: 57412BB4A00305DFDB14CF59C888AAAFBF5FB88314F14C599D559A7321D771A841CFA0
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00C559C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1668080147.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c50000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 858270f9966abcd081f73ec42e420e0bdc0bec419d1c5d4170e66264782d19fe
                                          • Instruction ID: d56b1d518366461b3734f9c3c7fdd1900e4eeb89cebc1f800ea6e83fe631f6cd
                                          • Opcode Fuzzy Hash: 858270f9966abcd081f73ec42e420e0bdc0bec419d1c5d4170e66264782d19fe
                                          • Instruction Fuzzy Hash: 1241D4B0C00619CBDB24DFA9C84479DBBB5BF48304F24816AD408AB255DB756989CF90
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00C559C9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1668080147.0000000000C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_c50000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 0d978b34f149653f537006d8d7758c7aa2d6fa4e05f2d879e7a23380b10a96a5
                                          • Instruction ID: 0300b00708e63ab54c8f9f6635de5588cce347eadb7dc71a9defa8f0e09e3ea0
                                          • Opcode Fuzzy Hash: 0d978b34f149653f537006d8d7758c7aa2d6fa4e05f2d879e7a23380b10a96a5
                                          • Instruction Fuzzy Hash: 564104B0C00619CFDB24DFA9C984BDDBBB5BF48304F24815AD408AB255DB75698ACF90
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E22240
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: d2efc68eed41b622786478167339008d6994501cea9c6de64b3e10a64e4385e7
                                          • Instruction ID: 7c1f2840216d172dc99af5d8414e34c3856ce06d6661dcd5f448e3c2c077e596
                                          • Opcode Fuzzy Hash: d2efc68eed41b622786478167339008d6994501cea9c6de64b3e10a64e4385e7
                                          • Instruction Fuzzy Hash: C7216BB1D103599FCB10CFA9C841BEEBBF1FF48314F108429EA59A7251C7759644CBA4
                                          APIs
                                          • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0722AF4D,?,?), ref: 0722AFFF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674541036.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7220000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DrawText
                                          • String ID:
                                          • API String ID: 2175133113-0
                                          • Opcode ID: 0348941af35fb4059215d6b1e5cb239e786e987a2707ecd6ddaa13dd2ca93a22
                                          • Instruction ID: 9b64136d6d90453d05b857736294af37972f810167f135c9bee4b6fdcbef3f98
                                          • Opcode Fuzzy Hash: 0348941af35fb4059215d6b1e5cb239e786e987a2707ecd6ddaa13dd2ca93a22
                                          • Instruction Fuzzy Hash: 8131E4B5910319AFDB10CF99D884A9EFBF5EB48310F14842AE915A7210D375A941CFA0
                                          APIs
                                          • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,0722AF4D,?,?), ref: 0722AFFF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674541036.0000000007220000.00000040.00000800.00020000.00000000.sdmp, Offset: 07220000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7220000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DrawText
                                          • String ID:
                                          • API String ID: 2175133113-0
                                          • Opcode ID: 9157cb509b1d0cc02bb7437be7f275f96492faba35eb48988d3dde5f89254b2c
                                          • Instruction ID: 003d006fa82ceb52301df6596ddeb0fbbc38c376e6f1fa8ef32ca01ceef7c509
                                          • Opcode Fuzzy Hash: 9157cb509b1d0cc02bb7437be7f275f96492faba35eb48988d3dde5f89254b2c
                                          • Instruction Fuzzy Hash: 5A31E0B5D1021AAFDB10CF99D884ADEFBF5FB48320F14842AE818A7310D375A945CFA0
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E22240
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: fd8ebc14f6cb8023db7979c1e7c70d1d61fdeb0d5eb3ccc48908932ef46a72f2
                                          • Instruction ID: cd8080f0dd108237c2dbd5376b2d9b0e20a68447f4533782c9366a4999156646
                                          • Opcode Fuzzy Hash: fd8ebc14f6cb8023db7979c1e7c70d1d61fdeb0d5eb3ccc48908932ef46a72f2
                                          • Instruction Fuzzy Hash: 162157B2D003599FCB10CFA9C881BEEBBF5FF48314F10842AE958A7250C7799944CBA4
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E22320
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 34c26518600b93982bc9fe96bf15a728b8f733c385679228096735776fe24d4b
                                          • Instruction ID: bcb4971e9f8c838fdf7fa158251f8f914dbb8f63773588791ee59491904ae914
                                          • Opcode Fuzzy Hash: 34c26518600b93982bc9fe96bf15a728b8f733c385679228096735776fe24d4b
                                          • Instruction Fuzzy Hash: C02114B18002599FCB10DFAAC885AEEBBF1FF48310F10882AE559A7250C7799944CBA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E22096
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 744aa66adf953d4e1594cca07cbd99bb1a666afc2db0f6ede1a4c6f4e4bafe1d
                                          • Instruction ID: 87af229b4606b232d922fcf1adeb8c1fec52b1dc87070099ed84ea818af56d4c
                                          • Opcode Fuzzy Hash: 744aa66adf953d4e1594cca07cbd99bb1a666afc2db0f6ede1a4c6f4e4bafe1d
                                          • Instruction Fuzzy Hash: 5F2138B1D003198FDB10DFAAC485BEEBBF5EF88324F14842AD559A7241D7789A44CFA4
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E22320
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 537f610ab1cc30df414a2bb489ffd18fcc3761296be16d53fe27c815b22fa303
                                          • Instruction ID: 721923039f69d494c965f3261d47976c6d91ee42a2ce7f7082bbfc9a1a03b792
                                          • Opcode Fuzzy Hash: 537f610ab1cc30df414a2bb489ffd18fcc3761296be16d53fe27c815b22fa303
                                          • Instruction Fuzzy Hash: 482114B18003599FCB10DFAAC885AEEFBF5FF48320F10842AE558A7250C7789944CBA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04BB4047
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 4176ac6e3b9aed7c6aa27adc4fd8edf83b9740445fc7c07a8ba3bd5c5c0b2c71
                                          • Instruction ID: bb18fe81cda337a0ae46316983938844670233bc418e228ec79e33bef11c0143
                                          • Opcode Fuzzy Hash: 4176ac6e3b9aed7c6aa27adc4fd8edf83b9740445fc7c07a8ba3bd5c5c0b2c71
                                          • Instruction Fuzzy Hash: 522103B59002489FDB10CFAAD584AEEFFF4FB48310F14845AE958A3211D375A940CFA0
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E22320
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 1f510f749e83a2c71dbe3b41a9b2371a54610e0a3c121fba4c77f1d48ad47272
                                          • Instruction ID: 303c2fcd0c7607aad4d2fc4b664a625aa4bc5fac2e34aebc64e06a10887809f8
                                          • Opcode Fuzzy Hash: 1f510f749e83a2c71dbe3b41a9b2371a54610e0a3c121fba4c77f1d48ad47272
                                          • Instruction Fuzzy Hash: DE2114B18003599FCB10DFAAC885AEEFBF5FF48320F10842AE558A7250C7789944CBA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E22096
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: ffbac6e28252914acbf5bca5625dac7b3fa73b52ede7903dcea97efe9183c31c
                                          • Instruction ID: 0228f5bad618cae106cecb8d220d9afb4c27fa11b6433fd156d57f0a349df7df
                                          • Opcode Fuzzy Hash: ffbac6e28252914acbf5bca5625dac7b3fa73b52ede7903dcea97efe9183c31c
                                          • Instruction Fuzzy Hash: C72138B1D003198FDB10DFAAC485BEEBBF5EF48324F10842AD559A7241D7789944CFA4
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 04BB4047
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 9117ea28c8cb2c9c11fad6d4146cfc03af336cda58dc0bd93a691224065a2216
                                          • Instruction ID: 74404fe0ceab8a0c1667c72150993649d7331a8002430695ba897cd3e8c3d172
                                          • Opcode Fuzzy Hash: 9117ea28c8cb2c9c11fad6d4146cfc03af336cda58dc0bd93a691224065a2216
                                          • Instruction Fuzzy Hash: 4521E4B59002089FDB10CFAAD984AEEFBF4FB48310F14841AE954A3351C375A940CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E2215E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 81ebc01d090fbe6d897c75ddc90fd90de387c6ab12878a797c7c739fd9e60e35
                                          • Instruction ID: 3467f6f8f349e31e8af7228fb8e22e19ba9a73bb206e063446fddc8ae5443db2
                                          • Opcode Fuzzy Hash: 81ebc01d090fbe6d897c75ddc90fd90de387c6ab12878a797c7c739fd9e60e35
                                          • Instruction Fuzzy Hash: A71167B19002499FCB20DFA9C845BEFBFF5EF88324F208419E559A7250C7369584CFA0
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E2215E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: ee2b71bb9156b1947e6f818af3f9bc0797ff82caacd9dc02bfa35f0c874d93c0
                                          • Instruction ID: 3979b1725023bdf20a86eff691d3d45e2a6fe667fe4e971d51ec8a59e75851f8
                                          • Opcode Fuzzy Hash: ee2b71bb9156b1947e6f818af3f9bc0797ff82caacd9dc02bfa35f0c874d93c0
                                          • Instruction Fuzzy Hash: 341126B19002499FCB10DFAAC845AEEBBF5EB88324F108419E559A7250C775A544CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: e239295f41d1e0c0f0e90af27a30e0de41db3603107c05159025f677dacef722
                                          • Instruction ID: bc1469dd5be0b1e6506a23669d04c5c333c1469d42e941c84df53c2e79d52a69
                                          • Opcode Fuzzy Hash: e239295f41d1e0c0f0e90af27a30e0de41db3603107c05159025f677dacef722
                                          • Instruction Fuzzy Hash: 131176B19043598FDB20DFAAC8457EFFBF5AF88324F20841AD519A7240C734A940CB94
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 5534c1e75518b3740ef467bfd2afac6c61ae3709545e7d0053fc6bc60e494a6a
                                          • Instruction ID: ea0262f8938f05d1421be0fd8bfa838a6b1edbf9f494e15523985ba513d756f2
                                          • Opcode Fuzzy Hash: 5534c1e75518b3740ef467bfd2afac6c61ae3709545e7d0053fc6bc60e494a6a
                                          • Instruction Fuzzy Hash: 471158B19043498FDB10DFAAC8457DEFBF5AF88324F208419D559A7250C735A544CF94
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E251CD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: e3981c9d8eb4cc92a2c1b7fb9d6d530d6d43df2b225066362b5451d8e3c6e937
                                          • Instruction ID: ab1792807d8fd8cc426808160ba79182429d13ca09a6926dd1836ecbd6e2ea43
                                          • Opcode Fuzzy Hash: e3981c9d8eb4cc92a2c1b7fb9d6d530d6d43df2b225066362b5451d8e3c6e937
                                          • Instruction Fuzzy Hash: 711133B58007199FCB10DF9AD945BEEFFF8EB48320F20851AE559A3250C375A984CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E251CD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: c8c3b0a12ee9a21b3440243f8fa2d26e18377cb7e4d2305224ed6488eb699536
                                          • Instruction ID: 740f55aa82ec286983e276de60e43daa25d8a3c7174c4340a893d5f640c31716
                                          • Opcode Fuzzy Hash: c8c3b0a12ee9a21b3440243f8fa2d26e18377cb7e4d2305224ed6488eb699536
                                          • Instruction Fuzzy Hash: 5B1103B5800759DFDB10DF9AC945BEEFBF8EB48324F10841AE558A7200C375A984CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (bq
                                          • API String ID: 0-149360118
                                          • Opcode ID: e45d824b6871b66dca43b0f283bb0b6420da0b15ed9dbdced5461bc14aa6487c
                                          • Instruction ID: f34967de821b982c7d621c15635249607023b3896e387e658e46453cf7349660
                                          • Opcode Fuzzy Hash: e45d824b6871b66dca43b0f283bb0b6420da0b15ed9dbdced5461bc14aa6487c
                                          • Instruction Fuzzy Hash: CE71D1B5E10219AFCF45DFA9D980AEEBBF6FF48310F14852AE919A3210D7319951CF90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Q
                                          • API String ID: 0-3463352047
                                          • Opcode ID: fc573d4b7979de973cf06341709c065fc60e54a3ae01fde2630bcec43433eb4e
                                          • Instruction ID: d53b531bbe417b1dc2a94f0975f602f44a55cbc9e7472bf9cfc213e2b8df36ac
                                          • Opcode Fuzzy Hash: fc573d4b7979de973cf06341709c065fc60e54a3ae01fde2630bcec43433eb4e
                                          • Instruction Fuzzy Hash: A7517330E002049FEB54EFAAD8817AE7BB2FF84710F148466F5459B395DB3489458BA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Te^q
                                          • API String ID: 0-671973202
                                          • Opcode ID: fd9b4519b39956b950fc60539c8145a8c748da845a27bba3834e3c86e1478e92
                                          • Instruction ID: 8b81c4eda7bc2db89bba9b6e1642b2a704786ff992997c3d22a45b3342090070
                                          • Opcode Fuzzy Hash: fd9b4519b39956b950fc60539c8145a8c748da845a27bba3834e3c86e1478e92
                                          • Instruction Fuzzy Hash: 8B112E31F0024A8BDB54EBB999115EEB7F6BFC4310B20417AC909E7344EB329E16CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Te^q
                                          • API String ID: 0-671973202
                                          • Opcode ID: 339a2965bca8bff9029a2483c81164dc9322a4b72ed41b62fd5b327e4aabc02e
                                          • Instruction ID: 6abd3c11d654b70fb8ee2060b2e7742c9cffe9530b2a5f9e66610c96ea1d1988
                                          • Opcode Fuzzy Hash: 339a2965bca8bff9029a2483c81164dc9322a4b72ed41b62fd5b327e4aabc02e
                                          • Instruction Fuzzy Hash: 64118375E00209DFCB08DFE9C4849ADFBB2FB88314F208129E918AB355C6316946CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0221e33484e6489c3804577927de9695b537147a4895fb319c7b51d3d5a0923
                                          • Instruction ID: 5639ed4606259504ef753392d7773e35746f6f01fa84e1896e50c4122a4e0c02
                                          • Opcode Fuzzy Hash: a0221e33484e6489c3804577927de9695b537147a4895fb319c7b51d3d5a0923
                                          • Instruction Fuzzy Hash: 93912C34A10758DFDB14DF64C850BAEBBB5FF89300F10819AE949A7251EB319E86CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 908826952140722dfe2f090bb53994b96da53c1345a19adc818dd84284e5be71
                                          • Instruction ID: d5886f9e4e7d28d66b2cefe162865a605fa9d34bcb3813cfcb57ec84eb8cfe10
                                          • Opcode Fuzzy Hash: 908826952140722dfe2f090bb53994b96da53c1345a19adc818dd84284e5be71
                                          • Instruction Fuzzy Hash: 52912B74910719DBDB14DF64C840BEEBBB5FF89300F10819AE949A7211EB71AA86CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 85d862a40db8c519e2516aa1a3f2dd350f9c8454d4374540ce1c137448d61ed5
                                          • Instruction ID: f1ffe7c8df19f0978215db10b9d0c43e3144142d44fdb42486436fdf85b0d09a
                                          • Opcode Fuzzy Hash: 85d862a40db8c519e2516aa1a3f2dd350f9c8454d4374540ce1c137448d61ed5
                                          • Instruction Fuzzy Hash: 8591E93591061ACFDB10EF68C884A99F7B1FF89304F11C6D9E5497B225EB30AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 16fe7186df7df61d7bbdc3d5e0254f973ba63f3a0ac5b250e8d965a9bbaa1d87
                                          • Instruction ID: 49316f9e742918c3f547e5a376ec1cc83deee0efb9813ef633a36f01c537783a
                                          • Opcode Fuzzy Hash: 16fe7186df7df61d7bbdc3d5e0254f973ba63f3a0ac5b250e8d965a9bbaa1d87
                                          • Instruction Fuzzy Hash: 34713E35D10759DECF00DFA5C8405AEFBB5FF88304B14C55AE958AB221E731E996CB41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d162a35cd251908e09718af379daccd9bec557056b20bc89ab56c591937b07c5
                                          • Instruction ID: 2877007eed333737f2777234f80aa9d852b3eb38254bc073a3b2f2e664a54f98
                                          • Opcode Fuzzy Hash: d162a35cd251908e09718af379daccd9bec557056b20bc89ab56c591937b07c5
                                          • Instruction Fuzzy Hash: 7D711C35D10B59DACF00DFA5C8405AEFBB5FF88304B10C55AED58AB221EB31E996CB81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20d02b4ac309303d3e7c4e4aee2a9267d29a6b7a75aa5b567916c5ed0fccb78e
                                          • Instruction ID: 941d90726c29f42cda91602181b667dae4447a4edc70ea28ae46fff27548d1c7
                                          • Opcode Fuzzy Hash: 20d02b4ac309303d3e7c4e4aee2a9267d29a6b7a75aa5b567916c5ed0fccb78e
                                          • Instruction Fuzzy Hash: E351232681E3E06FD703AB3898B41D63FB49D6325435A90D7C0D0CF0A3D298994EC7AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 386cdd4610bd7a3cfa4da55f7edce764be20a2292a53464815d1cb12569706a8
                                          • Instruction ID: 9b0e2e87a8e8956f4f72d50f74f631a433bbc2c18578d3445836e7cc62972a1c
                                          • Opcode Fuzzy Hash: 386cdd4610bd7a3cfa4da55f7edce764be20a2292a53464815d1cb12569706a8
                                          • Instruction Fuzzy Hash: FF51D274E09218CFEB48DFAAC9446EDFBF6AF89300F10902AD419AB355DB709945CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07bafd224bf3e450dc598ac4c99923647f6cd52d324639fb2308355c16e30f75
                                          • Instruction ID: 0c1dc3d8f6cf5f33991b15083330e63e8a2c6fed694da76417d6bdff41eb75a3
                                          • Opcode Fuzzy Hash: 07bafd224bf3e450dc598ac4c99923647f6cd52d324639fb2308355c16e30f75
                                          • Instruction Fuzzy Hash: 59411974D09209CFEB48DFAAC4806EEBBF6AF8D300F14D0AAD519A7255D7309D41CBA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f44f244cb09e6813e0257646521714daf4049674cdda27894726f929e9fe1f55
                                          • Instruction ID: c89efd9b0b09855b9c607f0efbdd4584819a17a7cd8c67327c16d40008c3bce8
                                          • Opcode Fuzzy Hash: f44f244cb09e6813e0257646521714daf4049674cdda27894726f929e9fe1f55
                                          • Instruction Fuzzy Hash: 1A41C730B01305DFE751DF99C848BAEBBB2EF44301F14806AF511AB295DB36D845CBA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbae4a6d34f4ee3eb8802b9f7311ee428776f02628ad0f95455a73f1394228b9
                                          • Instruction ID: f26ac6124ed1cbcff0efdb6eb23437a1d49e7c4d935d0b46e43dd97ff2322ab9
                                          • Opcode Fuzzy Hash: dbae4a6d34f4ee3eb8802b9f7311ee428776f02628ad0f95455a73f1394228b9
                                          • Instruction Fuzzy Hash: 1441D274D09208CFEB48DFAAC9446EEBBF6AF89300F14942AD409AB355DB749946CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b72136730f5f005523f6aed6e97a7fa5fc89ffedd80ad4801f9bc0c942a7df6f
                                          • Instruction ID: cc257b8aad968ba7a1fa0ecafa138c9a5138856123b71fbbcbfaf69db104e0d3
                                          • Opcode Fuzzy Hash: b72136730f5f005523f6aed6e97a7fa5fc89ffedd80ad4801f9bc0c942a7df6f
                                          • Instruction Fuzzy Hash: 8E41C174D09218CFEB48DFAAD9846EDFBB6BF89300F10942AD40AAB255D7349946CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01651eabc551e05f5db2da9946e8fb123eb3a18743a15bdf2a66fac551b45dc3
                                          • Instruction ID: 03ca01c78cd5ba2922e14ea74e27d3e98dcf562c6cffb11351cbab0923d7c377
                                          • Opcode Fuzzy Hash: 01651eabc551e05f5db2da9946e8fb123eb3a18743a15bdf2a66fac551b45dc3
                                          • Instruction Fuzzy Hash: E4414C31E0068A8BDF10EFE6C4546DDFBB1FF88310F108629D419BB255DB71AA85CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f34fc58b09aa4bd8651cd85d3dad9a76261c34a1c5e807f7d244a1faba79ab3b
                                          • Instruction ID: ebd19802d0eb3bbcd3b975fe9200562a655c801731d2611fe75c0091c3cf69d9
                                          • Opcode Fuzzy Hash: f34fc58b09aa4bd8651cd85d3dad9a76261c34a1c5e807f7d244a1faba79ab3b
                                          • Instruction Fuzzy Hash: D3418BB1904248AFDF01DFA9C840AEEBFF1FF49314F04805AE859A7261D335D954CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47fa785495b0ba12261bbcef49652f7f6822469a6777fe4d1ed32416fe07d56b
                                          • Instruction ID: 090b297e64a0db26fb54e990c43535e4cf434a09bfd713a708a8194d751ae94f
                                          • Opcode Fuzzy Hash: 47fa785495b0ba12261bbcef49652f7f6822469a6777fe4d1ed32416fe07d56b
                                          • Instruction Fuzzy Hash: 2841E374E15209DFDB44EF9AD884AEDFBB5FF58310F109169E916A7201D730AA84CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc4363a5e43d3f63ceacb8c7e47f0ba3ea1694f3c9c226e5eddcc0de495b5d4e
                                          • Instruction ID: fac841540cecd8ad9ee36a1970d14d40bb1951ed55701bef1b6dbceb43f53a71
                                          • Opcode Fuzzy Hash: bc4363a5e43d3f63ceacb8c7e47f0ba3ea1694f3c9c226e5eddcc0de495b5d4e
                                          • Instruction Fuzzy Hash: FA217F30B142188FD758EBBDA45D62A7BE2EF89311F14846AF406CB3D5DE348C058791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1937b8806f0b0b8e3d45e2cf44b6ca10b5a5df55c1dfcba3063f98357891a28f
                                          • Instruction ID: 0f7334fd0bd8573f33c031aff81507dbdedc8076131598e551de3af46944d690
                                          • Opcode Fuzzy Hash: 1937b8806f0b0b8e3d45e2cf44b6ca10b5a5df55c1dfcba3063f98357891a28f
                                          • Instruction Fuzzy Hash: F331E274E06218CFEB94DF59C980BECBBB6BB49304F1091A9D50AE7361D7309A81CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae99dffca000db248599840dc1e6e591da6bb3b4f7e019f1f62c1758bc09650d
                                          • Instruction ID: b0714677fa208f483c3a679d99f5068b19bf2d5a223fa4f7e993645695827d81
                                          • Opcode Fuzzy Hash: ae99dffca000db248599840dc1e6e591da6bb3b4f7e019f1f62c1758bc09650d
                                          • Instruction Fuzzy Hash: 7C31B172E10219AF8F41DFA8D8808EEBBF6FF8C310B14412AFA14B3210D73199559F90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05d10dee3f7028a5eaa403d770599cc57295433b22cb7b0237b4d7a60f588b64
                                          • Instruction ID: a6ab925d626f38f7e99d3ab810918c86155b832d161771c55505a2ce8f200686
                                          • Opcode Fuzzy Hash: 05d10dee3f7028a5eaa403d770599cc57295433b22cb7b0237b4d7a60f588b64
                                          • Instruction Fuzzy Hash: A2216D30B142088FD748EBBDA45D62A7AD6EB88311F24882AF50AC73C5DE758C418B91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d2e85ea11560cd0c864eb4ec374f7980a91b7e0a5ed86b066ef216620e4397c
                                          • Instruction ID: 8a00ae802368def4dc32ee7a0d48a64694e1cd6ef11d8b8d96f2534c5706b0af
                                          • Opcode Fuzzy Hash: 4d2e85ea11560cd0c864eb4ec374f7980a91b7e0a5ed86b066ef216620e4397c
                                          • Instruction Fuzzy Hash: 2F41B374906368CFDBA0DF59C980BACB7B6BB49300F5094DAD509A7361D7319E84CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ed4c322045e98abaff564ba598e94da614c3286d7a9fc5a94760b7926dc29528
                                          • Instruction ID: dae6c47daa25bc997b493f797ca68a0e4f9e69d590d2b41bf9d114e6c4fb67dd
                                          • Opcode Fuzzy Hash: ed4c322045e98abaff564ba598e94da614c3286d7a9fc5a94760b7926dc29528
                                          • Instruction Fuzzy Hash: 3D21DE74B006549FCB55FB7A884847FBBBBEFC8250724892AD825D3340EE30CD0142A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 003d5c5542e4cf402662494c64da9fe3ecea0eda481fd33acd8944d52dbd6f8a
                                          • Instruction ID: 71c87c64471014d0158b056a233337ea88bd6f53c92e2c1239c4493c4a6d1957
                                          • Opcode Fuzzy Hash: 003d5c5542e4cf402662494c64da9fe3ecea0eda481fd33acd8944d52dbd6f8a
                                          • Instruction Fuzzy Hash: B73112B1900248AFDF51DF99C844AEEBBF6FB48314F148419F959A7220C775A990CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667741886.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9ed000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1398e10fa2c9dd2563d37a2e619f5935bfdbc67eb41bbd6314a68c226738d5c
                                          • Instruction ID: b9d5183b5aac7d2415e16f1533513f92580ebef516ca3cb78b4b6d157662249b
                                          • Opcode Fuzzy Hash: b1398e10fa2c9dd2563d37a2e619f5935bfdbc67eb41bbd6314a68c226738d5c
                                          • Instruction Fuzzy Hash: A6210371504280DFDB06DF14D9C0B27BF65FBA8314F20C569E9094B2AAC33AEC56CAA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667741886.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9ed000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08108e657befd6ed43105aa9dbf1b880dcc36ba9096b996da49b606cd5777b85
                                          • Instruction ID: 25415a3e1613f2cbb92a507c2ac675736b6a155ba2719fd5c6d61721267ed49b
                                          • Opcode Fuzzy Hash: 08108e657befd6ed43105aa9dbf1b880dcc36ba9096b996da49b606cd5777b85
                                          • Instruction Fuzzy Hash: 33212571500280EFCB06DF14D9C0B2BBF65FB94318F20C569E8094B25AC73ADC56DBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3656295a68ff468e38a2fd07c32661dc6433c793073e72cb849d654db20cf3e0
                                          • Instruction ID: cf97d15fe56b19f9a9feccee6d3d459af6fce236cd5888dfd0efa657190cb0eb
                                          • Opcode Fuzzy Hash: 3656295a68ff468e38a2fd07c32661dc6433c793073e72cb849d654db20cf3e0
                                          • Instruction Fuzzy Hash: 8731E174E06318CFEB94DF59C980BECB7B6BB49300F5090A9D40AAB321D7319A80CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667799344.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bbd9bb4ceb937731530f6573d1c8cca5f8aedb22945bdc0eca43271c2967a1f
                                          • Instruction ID: eb390add4c79889eee39c3ad4ee835901565be66e4c37e135b3fd3ab6f263548
                                          • Opcode Fuzzy Hash: 1bbd9bb4ceb937731530f6573d1c8cca5f8aedb22945bdc0eca43271c2967a1f
                                          • Instruction Fuzzy Hash: 30212971649208DFDB08DF14D9C4B36BB66FB84314F20C96DDA094B356C33AD846CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667799344.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4510b28daea36bfc1f66e645a4d71f53a39cc9fd91f0ab4a462e591c5b4ecd96
                                          • Instruction ID: 93d079ebfbef79fa7d81a5e2e39be8f52714cd8e8eb4cb04b2e3a35a66a9c64f
                                          • Opcode Fuzzy Hash: 4510b28daea36bfc1f66e645a4d71f53a39cc9fd91f0ab4a462e591c5b4ecd96
                                          • Instruction Fuzzy Hash: 47213B71504208DFDB05DF14D5C4B76BBA6FB84314F20C96DDA194B355C33AD846CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33bd8c49a2be348d367d2725a2b5ff557bd877528024ad1e3bf3e28151cd1d71
                                          • Instruction ID: 906b7209f3e1afc823e76b4ab6988c098d17acf25e9a4c1e61250cf5171fcdf8
                                          • Opcode Fuzzy Hash: 33bd8c49a2be348d367d2725a2b5ff557bd877528024ad1e3bf3e28151cd1d71
                                          • Instruction Fuzzy Hash: 0C112371B18248AFDF09DF74C8598AE7FFAEF45200B1484ABE804C7262EA30DE019725
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 320d53aa8b0b8452b5b3aab43d38a40be532efef62d96ca64f9b50fb08744f77
                                          • Instruction ID: fea518b730469e3a5223ccc12e1f2490914a51e107b34942bfafdd1ae9e80963
                                          • Opcode Fuzzy Hash: 320d53aa8b0b8452b5b3aab43d38a40be532efef62d96ca64f9b50fb08744f77
                                          • Instruction Fuzzy Hash: 1F21DF7CE0A209DFD784DFA6D5505AEBBF5AF49300F619099D809A7311D7309E41CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94df9feadeeb33e80d352a0082502995720a6f290aa9642ca940d6a1199bb5ed
                                          • Instruction ID: 062c10843a11c5f3570062033e3e7ff9ca3375a44a018be24baa011c4c0af307
                                          • Opcode Fuzzy Hash: 94df9feadeeb33e80d352a0082502995720a6f290aa9642ca940d6a1199bb5ed
                                          • Instruction Fuzzy Hash: AA110B30B463149FEBA4FA2A4C08B2A7B97ABC5B50F25846AD102DF2D5DE71CC458751
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 164982c085a94b8cf1442bcda8d11425c3de787e51e7682fe1a116bcf01a9cb5
                                          • Instruction ID: 7cfb77e0380e7fe54a54549dab644f3474fbcfb28e30208f66845217de7b874a
                                          • Opcode Fuzzy Hash: 164982c085a94b8cf1442bcda8d11425c3de787e51e7682fe1a116bcf01a9cb5
                                          • Instruction Fuzzy Hash: A331E47490A258CFDB90DF59C980BECB7B6BF4A340F509595D40ABB321D330AA80CF95
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 152b2bc85826a8c16b89eb59323196d084fd44831cc44fc95a3998f10c4c4b92
                                          • Instruction ID: a12159b8d6a81e60cf803368acd4c928bb6c3665d83a0d2d25e61e3107a66efb
                                          • Opcode Fuzzy Hash: 152b2bc85826a8c16b89eb59323196d084fd44831cc44fc95a3998f10c4c4b92
                                          • Instruction Fuzzy Hash: B921F934A06218CFEB54EF95C6C0AEDB7B6BB4D311F645199D40ABB265C331AD81CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef2f6ec01c66db43344a1b650bf6c7744f4c4b040928ccf9b2dd2d0ec443abc7
                                          • Instruction ID: 6a5b3fa10d6cf10c429e6ebf2698e2f86249e50044a57a207430087652ec9ff8
                                          • Opcode Fuzzy Hash: ef2f6ec01c66db43344a1b650bf6c7744f4c4b040928ccf9b2dd2d0ec443abc7
                                          • Instruction Fuzzy Hash: CC01A176D042188FDB60EFE9E4083EEFBE0DF45324F18885AD195E7920C6749585CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fec32e23cf4bcc3d7b166d9882c7135d8b130e5f2f12064b98c7496c9a585634
                                          • Instruction ID: 0c9403eb5758202a69fa2fa830474178311c58c25a286f7a3ead014fa627b5b6
                                          • Opcode Fuzzy Hash: fec32e23cf4bcc3d7b166d9882c7135d8b130e5f2f12064b98c7496c9a585634
                                          • Instruction Fuzzy Hash: 56110A71F47300DFEBA4FA168C04B2A7752EB85B51F65846AE101AF191DB71CC40C755
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 40f62e6faa2012bf572f181b0a3e8a3219716325d5282f87cf8a5f7e0a02fe9f
                                          • Instruction ID: e404c880b7d5b1a5005d7f9d69fb5825f6b2bfa3ac2e8b131f108eb8a8ceaab1
                                          • Opcode Fuzzy Hash: 40f62e6faa2012bf572f181b0a3e8a3219716325d5282f87cf8a5f7e0a02fe9f
                                          • Instruction Fuzzy Hash: 4F21A9BCE06209DFDB84DF9AD1809EEBBF5AB48300F609059D919A7711D7319E41CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83fb693024470ef4ef857d54b477f9033043498c9648e4d8f5a3bdee448f28c3
                                          • Instruction ID: 86b3cbe597eaffbae62b4e9ea05bc408f4286608da3456a5cc4bf9cb1e91f188
                                          • Opcode Fuzzy Hash: 83fb693024470ef4ef857d54b477f9033043498c9648e4d8f5a3bdee448f28c3
                                          • Instruction Fuzzy Hash: C5115EB4D0A248DFDB54EFAAC5405ADBBF5FF49300F5095DAD45897222D3309A45CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667741886.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9ed000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 119434cf497c6cb57b8b9e752e9a3a9fff9592b44b66dc6f1c25dcf21bfe6a11
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 7C11D376504280CFDB16CF14D5C4B16BF71FB98314F24C5A9EC090B25AC336D85ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667741886.00000000009ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 009ED000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9ed000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 418e4edf8d71f5236b7668fe47a18e8a0b7d852d70dc1667ebdc4876af3c5c31
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 1A11D376504280CFCB16CF10D5C4B16BF72FB94314F24C5A9EC094B25AC336D85ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a1da5ae6375cbc6850d45d006f5cb92b0c4d13097d8630a407b567d7893e9eaa
                                          • Instruction ID: e36098182bac7585d04a658fb99181dafce842ab56ffddada368bbdc68125458
                                          • Opcode Fuzzy Hash: a1da5ae6375cbc6850d45d006f5cb92b0c4d13097d8630a407b567d7893e9eaa
                                          • Instruction Fuzzy Hash: AB01ADB5A006559B8B65EA7A9C405BFBAB7EFC42607254929D828E7340EF30CA028761
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 39b646b97871fe43ed69bab196a35a1b275d0bdd1684b1f78a92de174516434e
                                          • Instruction ID: 3f8465ed0da88728b1e8523b19d9f883087a3b252fb2223b86fb9d5f98e9b63d
                                          • Opcode Fuzzy Hash: 39b646b97871fe43ed69bab196a35a1b275d0bdd1684b1f78a92de174516434e
                                          • Instruction Fuzzy Hash: 792123B6D00309DFCB10DF9AC984ADEBBF4FB48324F10841AE919A7211C339A544CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b44b7fa37f1910297556d6ec368175ac410010c0f054f10f5a3b81e4c18c81f8
                                          • Instruction ID: abc07b69053181a784fa72ce7227d6c80fd7a1bbdf4e41ec0a361c3cbeaecfab
                                          • Opcode Fuzzy Hash: b44b7fa37f1910297556d6ec368175ac410010c0f054f10f5a3b81e4c18c81f8
                                          • Instruction Fuzzy Hash: 7211EFB5900249DFCB10DF9AD984ADEBBF4FB48324F10842AE958A7211C375A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667799344.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 64d45473f29b0a9c251c975f4f97296cb3d5fa775218de9289067d50321d70fa
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: C811BB75504284DFDB02CF10C5C4B65BBA2FB84324F24C6AAD9494B296C33AD81ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1667799344.00000000009FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_9fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: bdc219768b00134d0532cfb261aa38ed44efabc2236dbdc78dac7534bc1d4ad4
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: 1A11D075608244DFDB05CF10D9C4B25BF72FB44314F24C6A9D9094B256C33AD80ACB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 808c9046adec2c680b4fc3e6b1624456beb775a5fcc89306bd80819fe3490df9
                                          • Instruction ID: 7711a20ec12fe71e6e248defc7b17f57e27f7188f64ac4f86e3020d3523a6f4c
                                          • Opcode Fuzzy Hash: 808c9046adec2c680b4fc3e6b1624456beb775a5fcc89306bd80819fe3490df9
                                          • Instruction Fuzzy Hash: 60115B3090A258CFE790EB55C584EECB7BABF4A341F509595E40AAB221C731E984CF94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84c83c8091d251112263579654084b2d4f65c88ecab9fd232969a0477997df9c
                                          • Instruction ID: 05cf3b435e7719d0489f7b21c68ba9446db2a40d5d3ea4189f0c9b629ae60a4c
                                          • Opcode Fuzzy Hash: 84c83c8091d251112263579654084b2d4f65c88ecab9fd232969a0477997df9c
                                          • Instruction Fuzzy Hash: 86F03C7090A208DFE744FF96D544ABDBBB9EF8A340F04A1A5D40A5B215D770BA45DB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 795064cec619c71c3dfd97cff3845bbf37f98331f56661c5f3550f9cbbedcb55
                                          • Instruction ID: c8987d2ba754462cef9845b730b485313b308a9993515123c591894b0504ec88
                                          • Opcode Fuzzy Hash: 795064cec619c71c3dfd97cff3845bbf37f98331f56661c5f3550f9cbbedcb55
                                          • Instruction Fuzzy Hash: CF016DB6800209DFDB10DF99D844BDEBBF4EF48324F14C41AE559A7660C379A984DFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af515b422b9fa4c3e77976e51f61b87470d0146c81360745845c907ce5cb7845
                                          • Instruction ID: 3344244c3735cb27092cbd1771aa4db86095640f8564b6d4dd9c308f488e328f
                                          • Opcode Fuzzy Hash: af515b422b9fa4c3e77976e51f61b87470d0146c81360745845c907ce5cb7845
                                          • Instruction Fuzzy Hash: 3EF0E2B2A24119AFEF09DB54DC829EE7FBAEF04204B0880ABE404D7265E230E901C759
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7416e6715ce869312fe0e51da75b9604395b8faa33857e613f94759593210d50
                                          • Instruction ID: 9af1b56c7845794fee7bf2e1f59b0d6b7850e1432e1c56bdd77b0bdf7f413046
                                          • Opcode Fuzzy Hash: 7416e6715ce869312fe0e51da75b9604395b8faa33857e613f94759593210d50
                                          • Instruction Fuzzy Hash: 9A0192B8D0A219CFDB94DF69D881AEDBBB4FB1A300F106095D51AE7311D6319E82CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ba0591e631599f557a7b7c19917d63da1dafa0651a59bf075b1ab1a6c92b3c11
                                          • Instruction ID: 95feff5d12ed541a5ec379498c421aa8462c238a684b8e9729a1283e1f0aed8e
                                          • Opcode Fuzzy Hash: ba0591e631599f557a7b7c19917d63da1dafa0651a59bf075b1ab1a6c92b3c11
                                          • Instruction Fuzzy Hash: 5EF0EC30E06218CFE748EB55C5C0AECB7B6BB4D341F945569D40AAB221C7729D80CF94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2dca436c6b2a3904e36df2e728bf1707409b1beffc17224303f1944618566b0f
                                          • Instruction ID: aec4ec086a182694dc24230bf2d9fe59323e73bedcc324d75abfb291bde0d013
                                          • Opcode Fuzzy Hash: 2dca436c6b2a3904e36df2e728bf1707409b1beffc17224303f1944618566b0f
                                          • Instruction Fuzzy Hash: 0D018130D0A244CFD744DF15C5C59ECBBB6BF59301F544499D00AAB226C7319884CF84
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c518e4b678a64122dd3d7e5645ddc89dbaf84749df1c1470b042b909475ae050
                                          • Instruction ID: 32fdc5d2a9723370f8cdb83a2df514f2b25a652d354ae773f8a4955d09148d32
                                          • Opcode Fuzzy Hash: c518e4b678a64122dd3d7e5645ddc89dbaf84749df1c1470b042b909475ae050
                                          • Instruction Fuzzy Hash: D6015F78D4A219CFDBA4DF65D581AEDBBB8AB09300F106095D50AE7311D7319E828F80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dfb283ddb7a2e8f6a4843d1831b1da9eb162871867317d6a76fb516501845de0
                                          • Instruction ID: c181483fc38818041e6c7e5168efad64b5811dab0c62546d238334ff7a4f279c
                                          • Opcode Fuzzy Hash: dfb283ddb7a2e8f6a4843d1831b1da9eb162871867317d6a76fb516501845de0
                                          • Instruction Fuzzy Hash: 3BF0DAB4D0420A9FDB84DFA9C841ABEBBF4FB48300F1545AAD518E7601E77496458BD1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a7284e3525f80a0c81b3b0a42509004faa7f7b85241d8a2361ce989cdcfe5cd
                                          • Instruction ID: ed0db54a3bd7303c852ddc55f6db850eda5eea5335cc876e6c98ff3e436b8d30
                                          • Opcode Fuzzy Hash: 5a7284e3525f80a0c81b3b0a42509004faa7f7b85241d8a2361ce989cdcfe5cd
                                          • Instruction Fuzzy Hash: E8F0DAB4E0020A9FDB44DFA9C441ABEBBF0BB48300F15446AD514E7241D77486458B90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 88d1ddaa0fe3e65f278848ddcaa64c39532f424456b937a3ad15d8756a1d3654
                                          • Instruction ID: 28692f66613dc48e0b2c588fe18db77d79c62c77740c3a23713cdd816cd1cad3
                                          • Opcode Fuzzy Hash: 88d1ddaa0fe3e65f278848ddcaa64c39532f424456b937a3ad15d8756a1d3654
                                          • Instruction Fuzzy Hash: 6FF030B1D05105DFCB60EF7DC555A9ABBF0BF08310F208A6AD064E72A5E7704605CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df7ef95c0af35d35c28a0f43a7a7f73c3c00cdcf35ebf534f344e5d26d7d1ef7
                                          • Instruction ID: 3c679c13bba542b56a7cb37fc85dd9b058b17b6635de3b4050fe6d96753369ac
                                          • Opcode Fuzzy Hash: df7ef95c0af35d35c28a0f43a7a7f73c3c00cdcf35ebf534f344e5d26d7d1ef7
                                          • Instruction Fuzzy Hash: A3F0B774907358CFDB64DF25D841BD8BBB5AB0A310F1055D9D919A7391DB319E81CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a5274117dff7da8ced81809048e84052fedb21c30e5152b1e4ec24a06d9669c
                                          • Instruction ID: 4fa2ed7e1e087ad020a47245f8bbc09d1ebc4d16658bd435ad02cc9df94af2f2
                                          • Opcode Fuzzy Hash: 5a5274117dff7da8ced81809048e84052fedb21c30e5152b1e4ec24a06d9669c
                                          • Instruction Fuzzy Hash: 40E0CDA0C2611ECFDB90FF75C45D2946B51FF19310FD8096DD155C62C1DAB4C649C963
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 249838d950519a0d9a77d68832eb06207652a2b053d78a5b67de4d2166ab772a
                                          • Instruction ID: 837573179258a2a55a8c2e7270173a1c02158b73b5ff6fc4fe9eaaca98a0321d
                                          • Opcode Fuzzy Hash: 249838d950519a0d9a77d68832eb06207652a2b053d78a5b67de4d2166ab772a
                                          • Instruction Fuzzy Hash: EBE0C29091D3A8DFCB61AFB2842D1417FA4FF42710B684DEEC0D48A1C2EA658649DF23
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab482deda608d8c4c684702ba2fd4bc4faf8b4197ee3e07234ae5184c6b2389f
                                          • Instruction ID: 78193616c91ac4f01dfe500ca72a3b4aa46c057333a7373bc1419f66fff870f6
                                          • Opcode Fuzzy Hash: ab482deda608d8c4c684702ba2fd4bc4faf8b4197ee3e07234ae5184c6b2389f
                                          • Instruction Fuzzy Hash: CAE0B6B1D40209DFD790EFB9C905A9EBBF0BF08200F1185B9D019E7261E7B496048F91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5a9bad37d91499e83f22fb049791b1fd4d9b890a04acb5981c5f2a7aa7699b7
                                          • Instruction ID: 149debc5ad9f17805a9d5c0880af62b4b4479aff8719019fafb4c19827220591
                                          • Opcode Fuzzy Hash: e5a9bad37d91499e83f22fb049791b1fd4d9b890a04acb5981c5f2a7aa7699b7
                                          • Instruction Fuzzy Hash: 75D02E3048F304CFE3213BE6E8283863FB3AF02346B058043D4C885069DA2202C9CB02
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75c84f080428a6c092e78321d6bbff87d5b36bde089127c5e31f59734e6ee573
                                          • Instruction ID: a938227eadee760118fb91d9d796e0b00241abfb258916f98e0e17f788a81d5b
                                          • Opcode Fuzzy Hash: 75c84f080428a6c092e78321d6bbff87d5b36bde089127c5e31f59734e6ee573
                                          • Instruction Fuzzy Hash: 15C08C8922C380DAD322AF208A22442BEB4BFA270136944C7CED885173DA205739D333
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b354ad8cf3c50a28aaa0293240ed29ee9e772ffe52d1c1e5f7862b30da961680
                                          • Instruction ID: 5091ed910901e8324923f29a8f8566572e0a7606319b9055fa88740b552c6942
                                          • Opcode Fuzzy Hash: b354ad8cf3c50a28aaa0293240ed29ee9e772ffe52d1c1e5f7862b30da961680
                                          • Instruction Fuzzy Hash: 64D0126E50A1801FF343B7208C52CC17F65EA5324434AC0C2D4509A437D801841E9793
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c98442e7d7472a21c11e13ad11d0503f1f64795b09addcf497365ec21f53d81
                                          • Instruction ID: 49c96ce3bed6b06f64304c4342073109e5c1f2a5edb45fe89f70d9e9fda3679d
                                          • Opcode Fuzzy Hash: 4c98442e7d7472a21c11e13ad11d0503f1f64795b09addcf497365ec21f53d81
                                          • Instruction Fuzzy Hash: 6DD01C38A42208CFEB10DB98EC40BD8BB38FB88310F0022A2C00D93214C7306AA88E40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7b31e2086482e1e8964d5b17bc78fa3b3e323f7fb04d50a0c7f9aa9868e94d0b
                                          • Instruction ID: 794382981cbc367e7ebc125fdcc4a30d9dc5c7873cf3be572996e054ce9a18d7
                                          • Opcode Fuzzy Hash: 7b31e2086482e1e8964d5b17bc78fa3b3e323f7fb04d50a0c7f9aa9868e94d0b
                                          • Instruction Fuzzy Hash: 5BD0123625020C9E4BC0FFD4EC40C5277DDBB246107048436E548CB621E721F574E7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6797fb70ccbb563f81e49cd764f8e5c617324f670ff9913fb3593c86e4e6bb2d
                                          • Instruction ID: 67c1cf30ead5617cff35f36dbe4faeff47487a2846dd2848caf206f7f051f7bd
                                          • Opcode Fuzzy Hash: 6797fb70ccbb563f81e49cd764f8e5c617324f670ff9913fb3593c86e4e6bb2d
                                          • Instruction Fuzzy Hash: 51C08C304437098BE744B7E6B40C3683A6BA74032AF400010E20D020108F6240C8CE91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ef504a71aec703b7d634ee8470391bb5f18e3dda2abeb247d19549ae62d1284
                                          • Instruction ID: 9922086384c3b5909db568f0518ee87f8210aa9f26e475224d1c39b3b9493d3b
                                          • Opcode Fuzzy Hash: 6ef504a71aec703b7d634ee8470391bb5f18e3dda2abeb247d19549ae62d1284
                                          • Instruction Fuzzy Hash: ACC04C36155144AF9B81F7558984C19FAB1FF95300B408861A24985034CA21C558EB86
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06a07a8c881bbee26cb34d2e2fb599b41d3d05c82f7addb5c4b75c9f39e8a018
                                          • Instruction ID: a54e8bdb37a1ea100c53a67a8fb3c8f63d3bfdd76fc46bd9e4bbec26af521760
                                          • Opcode Fuzzy Hash: 06a07a8c881bbee26cb34d2e2fb599b41d3d05c82f7addb5c4b75c9f39e8a018
                                          • Instruction Fuzzy Hash: DEB012792B4504F69600F364498493EEC11EFE5740FD1DC11B34580024C570C469FA3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Nf
                                          • API String ID: 0-3311990345
                                          • Opcode ID: 63099e1ca75b09e664aa70f9b284c873f666ca5d4a4ec26f21a167b7938ea844
                                          • Instruction ID: 4d09ba5b5dd83697e76d06791fc67846548b5cb4260fe21646472dc428ed3f1d
                                          • Opcode Fuzzy Hash: 63099e1ca75b09e664aa70f9b284c873f666ca5d4a4ec26f21a167b7938ea844
                                          • Instruction Fuzzy Hash: 20E10C74E002198FDB14DFA9C580AAEFBF2FF89304F249169D515AB359D731AA41CFA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Nf
                                          • API String ID: 0-3311990345
                                          • Opcode ID: fde87d99f8d33685c25cbd7e2890d0ee4a9de77de7ed213f1540693b047782ac
                                          • Instruction ID: 235218145894aa94b8612a91cc1a81b527354b3d90101a2d1020e8b62f445ddc
                                          • Opcode Fuzzy Hash: fde87d99f8d33685c25cbd7e2890d0ee4a9de77de7ed213f1540693b047782ac
                                          • Instruction Fuzzy Hash: A5512C74E0022A8FDB14CFA9C5845AEFBF2BF89304F24D16AD518A7355D731AA41CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 94cbe2f798945d667084b7df2317a8b031d35b8ae2ddd5daded282de55c9a665
                                          • Instruction ID: 365f996b6ba3fa8e6296c9fb5b9da9d597946c50c34208b9e6e1da2759618ee1
                                          • Opcode Fuzzy Hash: 94cbe2f798945d667084b7df2317a8b031d35b8ae2ddd5daded282de55c9a665
                                          • Instruction Fuzzy Hash: 501271B0401F468AD710CF65FD4C2897BA1BB81328F914209D2A5AA3F9DBF915DACF74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9947bdb5a7721f712fdd847736e2b822250fe900917d72ead3e05c3bc908d727
                                          • Instruction ID: 40a23f09d8c0399cc6815d2edeab431e457279be316d19330604efdbbba03f62
                                          • Opcode Fuzzy Hash: 9947bdb5a7721f712fdd847736e2b822250fe900917d72ead3e05c3bc908d727
                                          • Instruction Fuzzy Hash: FCE10B74E001198FDB54DFA9C580AAEFBF2FF89304F249169D414AB35AD731A941CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec9991042063cde9b4abdd6535fe9bb22a9e423f1fa662f8d67ad3e1500ceafd
                                          • Instruction ID: f379fbe4932686e05bb1861558514e21ea3bb8b6e5dbc2c974aa8eab0ecd7e1c
                                          • Opcode Fuzzy Hash: ec9991042063cde9b4abdd6535fe9bb22a9e423f1fa662f8d67ad3e1500ceafd
                                          • Instruction Fuzzy Hash: 54E1FA74E002298FDB54DFA9C5849AEFBF2BF89304F249169D414AB35ADB30A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6117583cb6d13aa0f4ef86be282de218b4e47729eb6bec48dceda8b4f84b41cd
                                          • Instruction ID: 6285e36ccfd2cc8c4723f3b4fc664e445b279e92a58200ceb1283064bcfee460
                                          • Opcode Fuzzy Hash: 6117583cb6d13aa0f4ef86be282de218b4e47729eb6bec48dceda8b4f84b41cd
                                          • Instruction Fuzzy Hash: E4D12931920A5A8ACB01EBB4D994A9DF7B1FF95300F60D79AE00937255EB70BAC4CF41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 47228c20bb701e838c4e07e877351f3b6ba01a5212e96d43313b0c06ca01282b
                                          • Instruction ID: 939fccf1262531216e8d49ebf03a7a0505cfee1d0e38fa4f99c63ad090b8d32a
                                          • Opcode Fuzzy Hash: 47228c20bb701e838c4e07e877351f3b6ba01a5212e96d43313b0c06ca01282b
                                          • Instruction Fuzzy Hash: BAA1AF32E00209DFCF15DFB4C8805EEB7B2FF85304B1545AAE845AB265DBB1E955CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1672148447.0000000004BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4bb0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 191b9f6ec3985622808492541cb287592ce4c68748549fecec0bf6acb3de5162
                                          • Instruction ID: f81ef4b9185e1b9f04f9e0e9422fedecaafc10f89a836c01e74af04a84375961
                                          • Opcode Fuzzy Hash: 191b9f6ec3985622808492541cb287592ce4c68748549fecec0bf6acb3de5162
                                          • Instruction Fuzzy Hash: F2C1D4B0801B468AD710CF65FC482897BB1BB85328F554219D2A1AB3F9DBF855CACF74
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8f5591d1574cb88e938b60d1ca6ac110fcf3b19af8cb393c45330d24b3915b3c
                                          • Instruction ID: a65b3da34a5fb37536bd2a42f2c403c531264a9f901c102906db48c57f882522
                                          • Opcode Fuzzy Hash: 8f5591d1574cb88e938b60d1ca6ac110fcf3b19af8cb393c45330d24b3915b3c
                                          • Instruction Fuzzy Hash: 4461AF70D003698FCB55CFA9C9845AEBBF2FF89304F1491AAD408AB256D7309D46CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674343674.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e20000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78d3a74b55d3ffec5d2f617da8bebdf2792082c45858f59838b8f39aa85de3b2
                                          • Instruction ID: 7386bb0576e54c2b36ac215354b6f8f37f88f713a53bf3e1994f4eb852c745c6
                                          • Opcode Fuzzy Hash: 78d3a74b55d3ffec5d2f617da8bebdf2792082c45858f59838b8f39aa85de3b2
                                          • Instruction Fuzzy Hash: 7331D8B1D05728CAEB68CF57DC047DAFAF7ABC9300F04D0AAC40D66255DB740A898F51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1674009540.0000000006C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6c40000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: aafdb72aae8d44009770d67b2ff904a3962ee8216ba0092af444a3b89dd4aea6
                                          • Instruction ID: f818eecf78a5bafccfe36bd9f1faa96f742019e9ad676b5b6a7e6c3a14bfcbd2
                                          • Opcode Fuzzy Hash: aafdb72aae8d44009770d67b2ff904a3962ee8216ba0092af444a3b89dd4aea6
                                          • Instruction Fuzzy Hash: C0913A70E00118CFCB54DFAAC584AADB7F2BF49310F298559E856AB669C730ED81CF94

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:166
                                          Total number of Limit Nodes:18
                                          execution_graph 37812 6622ac0 DuplicateHandle 37813 6622b56 37812->37813 37814 662d0f0 37815 662d158 CreateWindowExW 37814->37815 37817 662d214 37815->37817 37817->37817 37818 27c0848 37820 27c084e 37818->37820 37819 27c091b 37820->37819 37824 6621b60 37820->37824 37828 6621b70 37820->37828 37832 27c1343 37820->37832 37825 6621b70 37824->37825 37836 662175c 37825->37836 37829 6621b72 37828->37829 37830 662175c 2 API calls 37829->37830 37831 6621ba0 37830->37831 37831->37820 37834 27c1356 37832->37834 37833 27c1440 37833->37820 37834->37833 37897 27c7e71 37834->37897 37837 6621767 37836->37837 37840 662271c 37837->37840 37839 6623126 37841 6622727 37840->37841 37842 662384c 37841->37842 37845 66254e0 37841->37845 37849 66254d0 37841->37849 37842->37839 37846 6625501 37845->37846 37847 6625525 37846->37847 37853 6625690 37846->37853 37847->37842 37850 66254d4 37849->37850 37851 6625525 37850->37851 37852 6625690 2 API calls 37850->37852 37851->37842 37852->37851 37854 662569d 37853->37854 37855 66256d6 37854->37855 37857 662416c 37854->37857 37855->37847 37858 6624177 37857->37858 37860 6625748 37858->37860 37861 66241a0 37858->37861 37860->37860 37862 66241ab 37861->37862 37868 66241b0 37862->37868 37864 66257b7 37872 662ac58 37864->37872 37877 662ac40 37864->37877 37865 66257f1 37865->37860 37871 66241bb 37868->37871 37869 6626bb8 37869->37864 37870 66254e0 2 API calls 37870->37869 37871->37869 37871->37870 37873 662ac5a 37872->37873 37874 662ac95 37873->37874 37882 662aec0 37873->37882 37886 662aed0 37873->37886 37874->37865 37878 662ac50 37877->37878 37879 662ac95 37878->37879 37880 662aec0 2 API calls 37878->37880 37881 662aed0 2 API calls 37878->37881 37879->37865 37880->37879 37881->37879 37883 662aecc 37882->37883 37889 662af10 37883->37889 37884 662aeda 37884->37874 37887 662aeda 37886->37887 37888 662af10 2 API calls 37886->37888 37887->37874 37888->37887 37890 662af15 37889->37890 37891 662af54 37890->37891 37895 662b1ab LoadLibraryExW 37890->37895 37896 662b1b8 LoadLibraryExW 37890->37896 37891->37884 37892 662af4c 37892->37891 37893 662b158 GetModuleHandleW 37892->37893 37894 662b185 37893->37894 37894->37884 37895->37892 37896->37892 37898 27c7e7b 37897->37898 37899 27c7f31 37898->37899 37903 663fbb8 37898->37903 37912 663f978 37898->37912 37916 663f968 37898->37916 37899->37834 37904 663fbbe 37903->37904 37907 663f98d 37903->37907 37906 663fc53 37904->37906 37920 27cea28 37904->37920 37923 27cea21 37904->37923 37905 663fba2 37905->37899 37906->37899 37907->37905 37909 663fbb8 GlobalMemoryStatusEx 37907->37909 37908 663fd10 37908->37899 37909->37907 37913 663f98d 37912->37913 37914 663fba2 37913->37914 37915 663fbb8 GlobalMemoryStatusEx 37913->37915 37914->37899 37915->37913 37917 663f98d 37916->37917 37918 663fba2 37917->37918 37919 663fbb8 GlobalMemoryStatusEx 37917->37919 37918->37899 37919->37917 37927 27cea50 37920->37927 37921 27cea36 37921->37908 37924 27cea28 37923->37924 37926 27cea50 GlobalMemoryStatusEx 37924->37926 37925 27cea36 37925->37908 37926->37925 37928 27cea6d 37927->37928 37930 27cea95 37927->37930 37928->37921 37929 27ceab6 37929->37921 37930->37929 37931 27ceb7e GlobalMemoryStatusEx 37930->37931 37932 27cebae 37931->37932 37932->37921 37933 6622878 37934 66228be GetCurrentProcess 37933->37934 37936 6622910 GetCurrentThread 37934->37936 37937 6622909 37934->37937 37938 6622946 37936->37938 37939 662294d GetCurrentProcess 37936->37939 37937->37936 37938->37939 37941 6622983 37939->37941 37940 66229ab GetCurrentThreadId 37942 66229dc 37940->37942 37941->37940 37943 26fd030 37945 26fd048 37943->37945 37944 26fd0a2 37945->37944 37950 662d297 37945->37950 37954 662d2a8 37945->37954 37958 662e3f8 37945->37958 37967 662a4c4 37945->37967 37951 662d29c 37950->37951 37952 662a4c4 2 API calls 37951->37952 37953 662d2ef 37952->37953 37953->37944 37955 662d2ce 37954->37955 37956 662a4c4 2 API calls 37955->37956 37957 662d2ef 37956->37957 37957->37944 37959 662e3fc 37958->37959 37960 662e469 37959->37960 37962 662e459 37959->37962 37992 662a5ec 37960->37992 37976 662e580 37962->37976 37981 662e65c 37962->37981 37987 662e590 37962->37987 37963 662e467 37968 662a4cf 37967->37968 37969 662e469 37968->37969 37971 662e459 37968->37971 37970 662a5ec 2 API calls 37969->37970 37972 662e467 37970->37972 37973 662e580 2 API calls 37971->37973 37974 662e590 2 API calls 37971->37974 37975 662e65c 2 API calls 37971->37975 37973->37972 37974->37972 37975->37972 37978 662e58c 37976->37978 37977 662e630 37977->37963 37999 662e648 37978->37999 38002 662e638 37978->38002 37982 662e66a 37981->37982 37983 662e61a 37981->37983 37985 662e648 2 API calls 37983->37985 37986 662e638 2 API calls 37983->37986 37984 662e630 37984->37963 37985->37984 37986->37984 37989 662e592 37987->37989 37988 662e630 37988->37963 37990 662e648 2 API calls 37989->37990 37991 662e638 2 API calls 37989->37991 37990->37988 37991->37988 37993 662a5f7 37992->37993 37994 662f872 37993->37994 37995 662f91c 37993->37995 37997 662f8ca CallWindowProcW 37994->37997 37998 662f879 37994->37998 37996 662a4c4 CallWindowProcW 37995->37996 37996->37998 37997->37998 37998->37963 38000 662e659 37999->38000 38006 662f800 37999->38006 38000->37977 38003 662e63c 38002->38003 38004 662e659 38003->38004 38005 662f800 2 API calls 38003->38005 38004->37977 38005->38004 38007 662f80c 38006->38007 38008 662a5ec CallWindowProcW 38007->38008 38009 662f816 38008->38009 38009->38000 38010 662f872 38009->38010 38011 662f91c 38009->38011 38013 662f8ca CallWindowProcW 38010->38013 38014 662f879 38010->38014 38012 662a4c4 CallWindowProcW 38011->38012 38012->38014 38013->38014 38014->38000

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 530 6633060-6633081 531 6633083-6633086 530->531 532 6633088-66330a7 531->532 533 66330ac-66330af 531->533 532->533 534 6633850-6633852 533->534 535 66330b5-66330d4 533->535 536 6633854 534->536 537 6633859-663385c 534->537 543 66330d6-66330d9 535->543 544 66330ed-66330f7 535->544 536->537 537->531 540 6633862-663386b 537->540 543->544 545 66330db-66330eb 543->545 548 66330fd-663310c 544->548 545->548 656 663310e call 6633880 548->656 657 663310e call 6633878 548->657 549 6633113-6633118 550 6633125-6633402 549->550 551 663311a-6633120 549->551 572 6633842-663384f 550->572 573 6633408-66334b7 550->573 551->540 582 66334e0 573->582 583 66334b9-66334de 573->583 584 66334e9-66334fc 582->584 583->584 587 6633502-6633524 584->587 588 6633829-6633835 584->588 587->588 591 663352a-6633534 587->591 588->573 589 663383b 588->589 589->572 591->588 592 663353a-6633545 591->592 592->588 593 663354b-6633621 592->593 605 6633623-6633625 593->605 606 663362f-663365f 593->606 605->606 610 6633661-6633663 606->610 611 663366d-6633679 606->611 610->611 612 663367b-663367f 611->612 613 66336d9-66336dd 611->613 612->613 616 6633681-66336ab 612->616 614 66336e3-663371f 613->614 615 663381a-6633823 613->615 626 6633721-6633723 614->626 627 663372d-663373b 614->627 615->588 615->593 623 66336b9-66336d6 616->623 624 66336ad-66336af 616->624 623->613 624->623 626->627 630 6633752-663375d 627->630 631 663373d-6633748 627->631 635 6633775-6633786 630->635 636 663375f-6633765 630->636 631->630 634 663374a 631->634 634->630 640 6633788-663378e 635->640 641 663379e-66337aa 635->641 637 6633767 636->637 638 6633769-663376b 636->638 637->635 638->635 642 6633792-6633794 640->642 643 6633790 640->643 645 66337c2-6633813 641->645 646 66337ac-66337b2 641->646 642->641 643->641 645->615 647 66337b6-66337b8 646->647 648 66337b4 646->648 647->645 648->645 656->549 657->549
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 3d9e700449595ea3c41f6097370080ae147225f0abbc7a58be569213acc166f5
                                          • Instruction ID: fe3e3896d85e3565ccdb750d857e776a87f7e5ab7cc86470a849244e21e4d1c3
                                          • Opcode Fuzzy Hash: 3d9e700449595ea3c41f6097370080ae147225f0abbc7a58be569213acc166f5
                                          • Instruction Fuzzy Hash: DF322D31E1075ACFCB54EF75C99459DB7B6BF89300F20C6A9D409AB364EB30A985CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1253 6637d80-6637d9e 1255 6637da0-6637da3 1253->1255 1256 6637da5-6637dbf 1255->1256 1257 6637dc4-6637dc7 1255->1257 1256->1257 1258 6637dc9-6637dd7 1257->1258 1259 6637dde-6637de1 1257->1259 1266 6637e26-6637e3c 1258->1266 1267 6637dd9 1258->1267 1260 6637de3-6637dff 1259->1260 1261 6637e04-6637e07 1259->1261 1260->1261 1264 6637e14-6637e16 1261->1264 1265 6637e09-6637e13 1261->1265 1269 6637e18 1264->1269 1270 6637e1d-6637e20 1264->1270 1274 6637e42-6637e4b 1266->1274 1275 6638057-6638061 1266->1275 1267->1259 1269->1270 1270->1255 1270->1266 1276 6638062-6638076 1274->1276 1277 6637e51-6637e6e 1274->1277 1280 663807a-6638097 1276->1280 1281 6638078-6638079 1276->1281 1284 6638044-6638051 1277->1284 1285 6637e74-6637e9c 1277->1285 1283 6638099-663809c 1280->1283 1281->1280 1286 66380a2-66380b1 1283->1286 1287 66382d1-66382d4 1283->1287 1284->1274 1284->1275 1285->1284 1306 6637ea2-6637eab 1285->1306 1297 66380b3-66380ce 1286->1297 1298 66380d0-6638114 1286->1298 1288 66382f7-66382fa 1287->1288 1289 66382d6-66382f2 1287->1289 1290 6638300-663830c 1288->1290 1291 66383a5-66383a7 1288->1291 1289->1288 1299 6638317-6638319 1290->1299 1294 66383a9 1291->1294 1295 66383ae-66383b1 1291->1295 1294->1295 1295->1283 1300 66383b7-66383c0 1295->1300 1297->1298 1312 66382a5-66382bb 1298->1312 1313 663811a-663812b 1298->1313 1303 6638331-6638335 1299->1303 1304 663831b-6638321 1299->1304 1310 6638343 1303->1310 1311 6638337-6638341 1303->1311 1308 6638323 1304->1308 1309 6638325-6638327 1304->1309 1306->1276 1314 6637eb1-6637ecd 1306->1314 1308->1303 1309->1303 1316 6638348-663834a 1310->1316 1311->1316 1312->1287 1322 6638131-663814e 1313->1322 1323 6638290-663829f 1313->1323 1325 6637ed3-6637efd 1314->1325 1326 6638032-663803e 1314->1326 1318 663835b-6638394 1316->1318 1319 663834c-663834f 1316->1319 1318->1286 1341 663839a-66383a4 1318->1341 1319->1300 1322->1323 1335 6638154-663824a call 66365a0 1322->1335 1323->1312 1323->1313 1339 6637f03-6637f2b 1325->1339 1340 6638028-663802d 1325->1340 1326->1284 1326->1306 1389 6638258 1335->1389 1390 663824c-6638256 1335->1390 1339->1340 1347 6637f31-6637f5f 1339->1347 1340->1326 1347->1340 1352 6637f65-6637f6e 1347->1352 1352->1340 1354 6637f74-6637fa6 1352->1354 1362 6637fb1-6637fcd 1354->1362 1363 6637fa8-6637fac 1354->1363 1362->1326 1365 6637fcf-6638026 call 66365a0 1362->1365 1363->1340 1364 6637fae 1363->1364 1364->1362 1365->1326 1391 663825d-663825f 1389->1391 1390->1391 1391->1323 1392 6638261-6638266 1391->1392 1393 6638274 1392->1393 1394 6638268-6638272 1392->1394 1395 6638279-663827b 1393->1395 1394->1395 1395->1323 1396 663827d-6638289 1395->1396 1396->1323
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: a4c0dd7c9cf7501812a5accd9b7a40972ce085e0a400c0c94f703ab660dbf259
                                          • Instruction ID: 48c0c4d7d3b82f49ee9e17cd55bd61478532101c934a64a0c3ba463e3e48f673
                                          • Opcode Fuzzy Hash: a4c0dd7c9cf7501812a5accd9b7a40972ce085e0a400c0c94f703ab660dbf259
                                          • Instruction Fuzzy Hash: 4E029E30B002159FDB54DB64D980AAEB7E2FF84304F148569E90ADB394EB75EC86CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1592 66355a0-66355bd 1593 66355bf-66355c2 1592->1593 1594 66355c4-66355cd 1593->1594 1595 66355d8-66355db 1593->1595 1596 66355d3 1594->1596 1597 66356a5-66356ae 1594->1597 1598 66355f7-66355fa 1595->1598 1599 66355dd-66355f2 1595->1599 1596->1595 1602 66356b4-66356bf 1597->1602 1603 663578a-66357b3 1597->1603 1600 6635606-6635609 1598->1600 1601 66355fc-6635605 1598->1601 1599->1598 1605 6635615-663561b 1600->1605 1606 663560b-663560e 1600->1606 1602->1603 1607 66356c5-66356d5 1602->1607 1620 66357bd-66357c0 1603->1620 1609 6635621 1605->1609 1610 6635740-663574e 1605->1610 1606->1594 1608 6635610-6635613 1606->1608 1607->1603 1612 66356db-66356df 1607->1612 1608->1605 1614 6635626-6635629 1608->1614 1609->1614 1615 6635755-6635758 1610->1615 1613 66356e4-66356e7 1612->1613 1616 66356e9-66356f8 1613->1616 1617 66356fd-6635700 1613->1617 1618 6635633-6635636 1614->1618 1619 663562b-663562e 1614->1619 1621 663575d-6635760 1615->1621 1616->1617 1622 6635702-6635709 1617->1622 1623 663570e-6635711 1617->1623 1624 663565a-663565d 1618->1624 1625 6635638-6635655 1618->1625 1619->1618 1626 66357c2-66357c9 1620->1626 1627 66357ca-66357cd 1620->1627 1630 6635762-6635767 1621->1630 1631 663576a-663576c 1621->1631 1622->1623 1633 6635713-6635717 1623->1633 1634 663571e-6635721 1623->1634 1628 6635674-6635677 1624->1628 1629 663565f-663566f 1624->1629 1625->1624 1635 66357ef-66357f2 1627->1635 1636 66357cf-66357d3 1627->1636 1641 6635685-6635688 1628->1641 1642 6635679-663567e 1628->1642 1629->1628 1630->1631 1639 6635773-6635776 1631->1639 1640 663576e 1631->1640 1643 6635719 1633->1643 1644 663577c-6635789 1633->1644 1645 6635723-6635726 1634->1645 1646 663572b-663572e 1634->1646 1637 6635814-6635817 1635->1637 1638 66357f4-66357f8 1635->1638 1648 66358aa-66358e4 1636->1648 1649 66357d9-66357e1 1636->1649 1652 6635819-663582a 1637->1652 1653 663582f-6635832 1637->1653 1638->1648 1651 66357fe-6635806 1638->1651 1639->1593 1639->1644 1640->1639 1658 66356a0-66356a3 1641->1658 1659 663568a-663569b 1641->1659 1642->1619 1657 6635680 1642->1657 1643->1634 1645->1646 1654 6635730-6635736 1646->1654 1655 663573b-663573e 1646->1655 1670 66358e6-66358e9 1648->1670 1649->1648 1650 66357e7-66357ea 1649->1650 1650->1635 1651->1648 1660 663580c-663580f 1651->1660 1652->1653 1661 6635834-6635838 1653->1661 1662 663584c-663584f 1653->1662 1654->1655 1655->1610 1655->1621 1657->1641 1658->1597 1658->1613 1659->1658 1660->1637 1661->1648 1666 663583a-6635842 1661->1666 1667 6635851-663585b 1662->1667 1668 6635860-6635863 1662->1668 1666->1648 1675 6635844-6635847 1666->1675 1667->1668 1673 6635873-6635876 1668->1673 1674 6635865-663586c 1668->1674 1671 66358f7-66358fa 1670->1671 1672 66358eb-66358f2 1670->1672 1676 6635914-6635917 1671->1676 1677 66358fc-663590d 1671->1677 1672->1671 1681 6635890-6635892 1673->1681 1682 6635878-663587c 1673->1682 1679 66358a2-66358a9 1674->1679 1680 663586e 1674->1680 1675->1662 1684 6635921-6635924 1676->1684 1685 6635919-663591e 1676->1685 1692 6635960-6635973 1677->1692 1693 663590f 1677->1693 1680->1673 1686 6635894 1681->1686 1687 6635899-663589c 1681->1687 1682->1648 1683 663587e-6635886 1682->1683 1683->1648 1691 6635888-663588b 1683->1691 1689 6635926-6635937 1684->1689 1690 663593e-6635941 1684->1690 1685->1684 1686->1687 1687->1620 1687->1679 1694 6635943-6635954 1689->1694 1702 6635939 1689->1702 1690->1694 1695 663595b-663595e 1690->1695 1691->1681 1693->1676 1694->1672 1703 6635956 1694->1703 1695->1692 1697 6635976-6635979 1695->1697 1700 6635987-663598a 1697->1700 1701 663597b-6635982 1697->1701 1704 66359a8-66359ab 1700->1704 1705 663598c-663599d 1700->1705 1701->1700 1702->1690 1703->1695 1706 66359b6-6635b4a 1704->1706 1707 66359ad-66359b0 1704->1707 1705->1672 1711 66359a3 1705->1711 1741 6635c80-6635c93 1706->1741 1742 6635b50-6635b57 1706->1742 1707->1706 1709 6635c96-6635c99 1707->1709 1712 6635cb7-6635cba 1709->1712 1713 6635c9b-6635cac 1709->1713 1711->1704 1712->1706 1714 6635cc0-6635cc2 1712->1714 1713->1672 1720 6635cb2 1713->1720 1715 6635cc4 1714->1715 1716 6635cc9-6635ccc 1714->1716 1715->1716 1716->1670 1719 6635cd2-6635cdb 1716->1719 1720->1712 1743 6635c0b-6635c12 1742->1743 1744 6635b5d-6635b90 1742->1744 1743->1741 1745 6635c14-6635c47 1743->1745 1755 6635b92 1744->1755 1756 6635b95-6635bd6 1744->1756 1757 6635c49 1745->1757 1758 6635c4c-6635c79 1745->1758 1755->1756 1766 6635bd8-6635be9 1756->1766 1767 6635bee-6635bf5 1756->1767 1757->1758 1758->1719 1766->1719 1769 6635bfd-6635bff 1767->1769 1769->1719
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $
                                          • API String ID: 0-3993045852
                                          • Opcode ID: 374b52f9cd1b54efd9c1a99ea6902c5ff40d6999ed5f90df288eb95497bef876
                                          • Instruction ID: 5067853fa3a8a0c6e52abab93612cdbbe648fa689658cb071ac2f0d4f7ca2ff2
                                          • Opcode Fuzzy Hash: 374b52f9cd1b54efd9c1a99ea6902c5ff40d6999ed5f90df288eb95497bef876
                                          • Instruction Fuzzy Hash: E422E375E102259FDF60DBA4C4906AEB7F2EF85324F24846AD44AEB394DB31DC42CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92ffc4bdba644111c0148c7831acf6d9f15d5e18fd91ecb24313ee2c17d414ba
                                          • Instruction ID: 77048f52830822ffadf1afbb07c4f9644b65c85516a0853c5b4a47aa66e854b4
                                          • Opcode Fuzzy Hash: 92ffc4bdba644111c0148c7831acf6d9f15d5e18fd91ecb24313ee2c17d414ba
                                          • Instruction Fuzzy Hash: 2B925634E002148FDB64CB68C594A6DBBF6FF49314F5484A9D84AAB361DB35ED86CF80
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc5336dc4d38dc33466f0a30da21d0736293cfdc512bfdcfdf8b9558bf79b9e1
                                          • Instruction ID: c8b36bce6250f2b6db33784a3c2b989ef231c0cd55b3a2334d93fcaecaca47b6
                                          • Opcode Fuzzy Hash: dc5336dc4d38dc33466f0a30da21d0736293cfdc512bfdcfdf8b9558bf79b9e1
                                          • Instruction Fuzzy Hash: CC62B034B00214AFDB54DF68D584AADB7F2EF89314F248469E90ADB394DB35EC46CB90
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f2409ae44e70e92c59e6c1e4f030bbfedc337b80978542dea485f78b84bfd970
                                          • Instruction ID: bd6ba59c630cab812523fefb9e201dd7155391befe4a5bb0b5019ce9625ddb57
                                          • Opcode Fuzzy Hash: f2409ae44e70e92c59e6c1e4f030bbfedc337b80978542dea485f78b84bfd970
                                          • Instruction Fuzzy Hash: 84326F34F102199FDF54DB68D980AAEB7B2FB88314F108529E505EB395DB31EC86CB91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 373c8cf81016de6ac56d344f27c734d848986c96fbe7d0054ee2dd265b312788
                                          • Instruction ID: c0b3f6df50122a272edb309dad838b0085b49caf3880de6a5b0cca8d37802d45
                                          • Opcode Fuzzy Hash: 373c8cf81016de6ac56d344f27c734d848986c96fbe7d0054ee2dd265b312788
                                          • Instruction Fuzzy Hash: D9227130E102199FEF64CF68D5807ADB7B6FB99310F208926E449DB395DA35DC81CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 658 663b658-663b67a 659 663b67c-663b67f 658->659 660 663b691-663b694 659->660 661 663b681 659->661 662 663b696-663b6f3 call 66365a0 660->662 663 663b6f8-663b6fb 660->663 664 663b689-663b68c 661->664 662->663 665 663b702-663b705 663->665 666 663b6fd-663b6ff 663->666 664->660 667 663b743-663b746 665->667 668 663b707-663b71c 665->668 666->665 671 663b750-663b753 667->671 672 663b748-663b74b 667->672 677 663b9f3-663ba2e 668->677 681 663b722-663b73e 668->681 673 663b755-663b759 671->673 674 663b76a-663b76d 671->674 672->671 673->677 678 663b75f-663b765 673->678 679 663b78a-663b78d 674->679 680 663b76f-663b778 674->680 692 663ba30-663ba33 677->692 678->674 683 663b7a0-663b7a3 679->683 684 663b78f-663b79b 679->684 680->677 682 663b77e-663b785 680->682 681->667 682->679 683->672 686 663b7a5-663b7a8 683->686 684->683 690 663b7aa-663b7ae 686->690 691 663b7bf-663b7c2 686->691 690->677 694 663b7b4-663b7ba 690->694 697 663b8e3-663b8ec 691->697 698 663b7c8-663b7cb 691->698 695 663ba56-663ba59 692->695 696 663ba35-663ba51 692->696 694->691 702 663bcc5-663bcc7 695->702 703 663ba5f-663ba87 695->703 696->695 697->680 704 663b8f2 697->704 699 663b7ed-663b7f0 698->699 700 663b7cd-663b7e8 698->700 708 663b7f2-663b7f5 699->708 709 663b800-663b803 699->709 700->699 706 663bcc9 702->706 707 663bcce-663bcd1 702->707 756 663ba91-663bad5 703->756 757 663ba89-663ba8c 703->757 710 663b8f7-663b8fa 704->710 706->707 707->692 713 663bcd7-663bce0 707->713 715 663b9b2-663b9b5 708->715 716 663b7fb 708->716 717 663b813-663b816 709->717 718 663b805-663b80e 709->718 719 663b904-663b907 710->719 720 663b8fc-663b901 710->720 715->677 722 663b9b7-663b9be 715->722 716->709 717->672 723 663b81c-663b81f 717->723 718->717 724 663b92a-663b92d 719->724 725 663b909-663b90d 719->725 720->719 728 663b9c3-663b9c6 722->728 732 663b821-663b822 723->732 733 663b827-663b82a 723->733 726 663b93a-663b93d 724->726 727 663b92f-663b935 724->727 725->677 734 663b913-663b923 725->734 735 663b954-663b957 726->735 736 663b93f-663b943 726->736 727->726 737 663b9d6-663b9d8 728->737 738 663b9c8-663b9cf 728->738 732->733 739 663b851-663b854 733->739 740 663b82c-663b830 733->740 745 663b959-663b95d 734->745 759 663b925 734->759 735->745 746 663b97e-663b981 735->746 736->677 741 663b949-663b94f 736->741 747 663b9da 737->747 748 663b9df-663b9e2 737->748 743 663b983-663b98c 738->743 744 663b9d1 738->744 739->708 742 663b856-663b859 739->742 740->677 751 663b836-663b846 740->751 741->735 752 663b85b-663b877 742->752 753 663b87c-663b87f 742->753 758 663b991-663b994 743->758 744->737 745->677 754 663b963-663b973 745->754 746->743 746->758 747->748 748->659 755 663b9e8-663b9f2 748->755 751->725 766 663b84c 751->766 752->753 761 663b881-663b896 753->761 762 663b8be-663b8c1 753->762 754->672 774 663b979 754->774 781 663badb-663bae4 756->781 782 663bcba-663bcc4 756->782 757->713 763 663b996-663b99f 758->763 764 663b9a4-663b9a7 758->764 759->724 761->677 778 663b89c-663b8b9 761->778 767 663b8c3-663b8c6 762->767 768 663b8cb-663b8ce 762->768 763->764 764->672 765 663b9ad-663b9b0 764->765 765->715 765->728 766->739 767->768 772 663b8d0-663b8d9 768->772 773 663b8de-663b8e1 768->773 772->773 773->697 773->710 774->746 778->762 783 663bcb0-663bcb5 781->783 784 663baea-663bb56 call 66365a0 781->784 783->782 792 663bc50-663bc65 784->792 793 663bb5c-663bb61 784->793 792->783 794 663bb63-663bb69 793->794 795 663bb7d 793->795 797 663bb6b-663bb6d 794->797 798 663bb6f-663bb71 794->798 799 663bb7f-663bb85 795->799 800 663bb7b 797->800 798->800 801 663bb87-663bb8d 799->801 802 663bb9a-663bba7 799->802 800->799 803 663bb93 801->803 804 663bc3b-663bc4a 801->804 809 663bba9-663bbaf 802->809 810 663bbbf-663bbcc 802->810 803->802 805 663bc02-663bc0f 803->805 806 663bbce-663bbdb 803->806 804->792 804->793 815 663bc11-663bc17 805->815 816 663bc27-663bc34 805->816 818 663bbf3-663bc00 806->818 819 663bbdd-663bbe3 806->819 812 663bbb3-663bbb5 809->812 813 663bbb1 809->813 810->804 812->810 813->810 820 663bc1b-663bc1d 815->820 821 663bc19 815->821 816->804 818->804 822 663bbe7-663bbe9 819->822 823 663bbe5 819->823 820->816 821->816 822->818 823->818
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2392861976
                                          • Opcode ID: 606b1add7e6ed2930589fa83b0594db90941252de0e684e101d6bb0363ba455b
                                          • Instruction ID: 1d59a0260109abe7629dbdde995ef051f50045c0cec0c7affeca7a8e73de6b93
                                          • Opcode Fuzzy Hash: 606b1add7e6ed2930589fa83b0594db90941252de0e684e101d6bb0363ba455b
                                          • Instruction Fuzzy Hash: D9026B30E002299FDBA4CF68D5807ADB7B2FB95310F10856AD409DB395DB74E986CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 826 6622873-6622907 GetCurrentProcess 830 6622910-6622944 GetCurrentThread 826->830 831 6622909-662290f 826->831 832 6622946-662294c 830->832 833 662294d-6622981 GetCurrentProcess 830->833 831->830 832->833 835 6622983-6622989 833->835 836 662298a-66229a2 833->836 835->836 849 66229a5 call 6622a48 836->849 850 66229a5 call 6622e28 836->850 851 66229a5 call 6622e38 836->851 838 66229ab-66229da GetCurrentThreadId 840 66229e3-6622a45 838->840 841 66229dc-66229e2 838->841 841->840 849->838 850->838 851->838
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 066228F6
                                          • GetCurrentThread.KERNEL32 ref: 06622933
                                          • GetCurrentProcess.KERNEL32 ref: 06622970
                                          • GetCurrentThreadId.KERNEL32 ref: 066229C9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 621bf3f63a6b8e09d7b932a16e217bdb5c1fdbc981e11aee0670bd34f122ad4c
                                          • Instruction ID: cafd9d13806b871f80e001c7004824fc0b6955fdd0bde6970a08492e2b573f12
                                          • Opcode Fuzzy Hash: 621bf3f63a6b8e09d7b932a16e217bdb5c1fdbc981e11aee0670bd34f122ad4c
                                          • Instruction Fuzzy Hash: 045166B0D00649CFDB84CFAAD548BEEBBF1AB48304F24C559E419AB360C7359984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 852 6622878-6622907 GetCurrentProcess 856 6622910-6622944 GetCurrentThread 852->856 857 6622909-662290f 852->857 858 6622946-662294c 856->858 859 662294d-6622981 GetCurrentProcess 856->859 857->856 858->859 861 6622983-6622989 859->861 862 662298a-66229a2 859->862 861->862 875 66229a5 call 6622a48 862->875 876 66229a5 call 6622e28 862->876 877 66229a5 call 6622e38 862->877 864 66229ab-66229da GetCurrentThreadId 866 66229e3-6622a45 864->866 867 66229dc-66229e2 864->867 867->866 875->864 876->864 877->864
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 066228F6
                                          • GetCurrentThread.KERNEL32 ref: 06622933
                                          • GetCurrentProcess.KERNEL32 ref: 06622970
                                          • GetCurrentThreadId.KERNEL32 ref: 066229C9
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 70d1449d991e953f3a9ff3b34569a605b9a8bbb75f71b52002c878eb5d67e902
                                          • Instruction ID: 556ffb08816ca6d7b196db2d168a83c596d8750e702943674151af10651188a4
                                          • Opcode Fuzzy Hash: 70d1449d991e953f3a9ff3b34569a605b9a8bbb75f71b52002c878eb5d67e902
                                          • Instruction Fuzzy Hash: 0F5166B0D00649CFDB84CFAAD948BDEBBF5AB48304F24C519E419AB360C7359984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 878 6639158-663917d 879 663917f-6639182 878->879 880 6639184-66391a3 879->880 881 66391a8-66391ab 879->881 880->881 882 66391b1-66391c6 881->882 883 6639a6b-6639a6d 881->883 890 66391c8-66391ce 882->890 891 66391de-66391f4 882->891 884 6639a74-6639a77 883->884 885 6639a6f 883->885 884->879 887 6639a7d-6639a87 884->887 885->884 892 66391d2-66391d4 890->892 893 66391d0 890->893 895 66391ff-6639201 891->895 892->891 893->891 896 6639203-6639209 895->896 897 6639219-663928a 895->897 898 663920b 896->898 899 663920d-663920f 896->899 908 66392b6-66392d2 897->908 909 663928c-66392af 897->909 898->897 899->897 914 66392d4-66392f7 908->914 915 66392fe-6639319 908->915 909->908 914->915 920 6639344-663935f 915->920 921 663931b-663933d 915->921 926 6639361-6639383 920->926 927 663938a-6639394 920->927 921->920 926->927 928 6639396-663939f 927->928 929 66393a4-663941e 927->929 928->887 935 6639420-663943e 929->935 936 663946b-6639480 929->936 940 6639440-663944f 935->940 941 663945a-6639469 935->941 936->883 940->941 941->935 941->936
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 4769cd85a9de455296c1c566320431bbd66d0e913b70b5cce8c19cf539edcbb6
                                          • Instruction ID: a3b80de4dcbb86355d5ddb4925e3a22b172478c86a482cc19e336ed242a28656
                                          • Opcode Fuzzy Hash: 4769cd85a9de455296c1c566320431bbd66d0e913b70b5cce8c19cf539edcbb6
                                          • Instruction Fuzzy Hash: 32914C30F1021A9FDB54DB65D9507AFB3F6ABC9304F108669C50AEB348EB709C468F91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 944 663cf48-663cf63 945 663cf65-663cf68 944->945 946 663cfb1-663cfb4 945->946 947 663cf6a-663cfac 945->947 948 663cfd7-663cfda 946->948 949 663cfb6-663cfd2 946->949 947->946 950 663d023-663d026 948->950 951 663cfdc-663d01e 948->951 949->948 954 663d028-663d037 950->954 955 663d06f-663d072 950->955 951->950 956 663d046-663d052 954->956 957 663d039-663d03e 954->957 960 663d074-663d083 955->960 961 663d0bb-663d0be 955->961 965 663d965-663d99e 956->965 966 663d058-663d06a 956->966 957->956 967 663d092-663d09e 960->967 968 663d085-663d08a 960->968 962 663d0c0-663d102 961->962 963 663d107-663d10a 961->963 962->963 969 663d110-663d113 963->969 970 663d434-663d440 963->970 980 663d9a0-663d9a3 965->980 966->955 967->965 971 663d0a4-663d0b6 967->971 968->967 974 663d115-663d11a 969->974 975 663d11d-663d120 969->975 970->954 977 663d446-663d733 970->977 971->961 974->975 982 663d122-663d124 975->982 983 663d12f-663d132 975->983 1157 663d95a-663d964 977->1157 1158 663d739-663d73f 977->1158 986 663d9c6-663d9c9 980->986 987 663d9a5-663d9c1 980->987 988 663d12a 982->988 989 663d2ef-663d2f8 982->989 991 663d134-663d176 983->991 992 663d17b-663d17e 983->992 998 663d9cb-663d9f7 986->998 999 663d9fc-663d9ff 986->999 987->986 988->983 1000 663d307-663d313 989->1000 1001 663d2fa-663d2ff 989->1001 991->992 996 663d180-663d1c2 992->996 997 663d1c7-663d1ca 992->997 996->997 1010 663d213-663d216 997->1010 1011 663d1cc-663d20e 997->1011 998->999 1008 663da01 call 663dabd 999->1008 1009 663da0e-663da10 999->1009 1002 663d424-663d429 1000->1002 1003 663d319-663d32d 1000->1003 1001->1000 1033 663d431 1002->1033 1032 663d333-663d345 1003->1032 1003->1033 1022 663da07-663da09 1008->1022 1015 663da12 1009->1015 1016 663da17-663da1a 1009->1016 1013 663d218-663d25a 1010->1013 1014 663d25f-663d262 1010->1014 1011->1010 1013->1014 1025 663d264-663d2a6 1014->1025 1026 663d2ab-663d2ae 1014->1026 1015->1016 1016->980 1023 663da1c-663da2b 1016->1023 1022->1009 1047 663da92-663daa7 1023->1047 1048 663da2d-663da90 call 66365a0 1023->1048 1025->1026 1029 663d2b0-663d2b2 1026->1029 1030 663d2bd-663d2c0 1026->1030 1029->1033 1036 663d2b8 1029->1036 1037 663d2c2-663d2d8 1030->1037 1038 663d2dd-663d2df 1030->1038 1056 663d347-663d34d 1032->1056 1057 663d369-663d36b 1032->1057 1033->970 1036->1030 1037->1038 1044 663d2e1 1038->1044 1045 663d2e6-663d2e9 1038->1045 1044->1045 1045->945 1045->989 1066 663daa8 1047->1066 1048->1047 1061 663d351-663d35d 1056->1061 1062 663d34f 1056->1062 1064 663d375-663d381 1057->1064 1071 663d35f-663d367 1061->1071 1062->1071 1082 663d383-663d38d 1064->1082 1083 663d38f 1064->1083 1066->1066 1071->1064 1087 663d394-663d396 1082->1087 1083->1087 1087->1033 1089 663d39c-663d3b8 call 66365a0 1087->1089 1098 663d3c7-663d3d3 1089->1098 1099 663d3ba-663d3bf 1089->1099 1098->1002 1102 663d3d5-663d422 1098->1102 1099->1098 1102->1033 1159 663d741-663d746 1158->1159 1160 663d74e-663d757 1158->1160 1159->1160 1160->965 1161 663d75d-663d770 1160->1161 1163 663d776-663d77c 1161->1163 1164 663d94a-663d954 1161->1164 1165 663d78b-663d794 1163->1165 1166 663d77e-663d783 1163->1166 1164->1157 1164->1158 1165->965 1167 663d79a-663d7bb 1165->1167 1166->1165 1170 663d7ca-663d7d3 1167->1170 1171 663d7bd-663d7c2 1167->1171 1170->965 1172 663d7d9-663d7f6 1170->1172 1171->1170 1172->1164 1175 663d7fc-663d802 1172->1175 1175->965 1176 663d808-663d821 1175->1176 1178 663d827-663d84e 1176->1178 1179 663d93d-663d944 1176->1179 1178->965 1182 663d854-663d85e 1178->1182 1179->1164 1179->1175 1182->965 1183 663d864-663d87b 1182->1183 1185 663d88a-663d8a5 1183->1185 1186 663d87d-663d888 1183->1186 1185->1179 1191 663d8ab-663d8c4 call 66365a0 1185->1191 1186->1185 1195 663d8d3-663d8dc 1191->1195 1196 663d8c6-663d8cb 1191->1196 1195->965 1197 663d8e2-663d936 1195->1197 1196->1195 1197->1179
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q
                                          • API String ID: 0-831282457
                                          • Opcode ID: e65c766f62007b47221b324e5d761162e0661c531646214011a7b40003c92d80
                                          • Instruction ID: 9903e5226c5650fac9d269e5903d9a7f3394fef7d55e68993ffefce830f0cfe2
                                          • Opcode Fuzzy Hash: e65c766f62007b47221b324e5d761162e0661c531646214011a7b40003c92d80
                                          • Instruction Fuzzy Hash: 70623D30A00215CFDB55EF68D590A5EB7B2FF84304F248A69D4099F369DB71ED8ACB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1205 6634b70-6634b94 1207 6634b96-6634b99 1205->1207 1208 6635278-663527b 1207->1208 1209 6634b9f-6634c97 1207->1209 1210 663527d-6635297 1208->1210 1211 663529c-663529e 1208->1211 1229 6634d1a-6634d21 1209->1229 1230 6634c9d-6634cea call 6635419 1209->1230 1210->1211 1212 66352a0 1211->1212 1213 66352a5-66352a8 1211->1213 1212->1213 1213->1207 1215 66352ae-66352bb 1213->1215 1231 6634d27-6634d97 1229->1231 1232 6634da5-6634dae 1229->1232 1243 6634cf0-6634d0c 1230->1243 1249 6634da2 1231->1249 1250 6634d99 1231->1250 1232->1215 1246 6634d17-6634d18 1243->1246 1247 6634d0e 1243->1247 1246->1229 1247->1246 1249->1232 1250->1249
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fcq$XPcq$\Ocq
                                          • API String ID: 0-3575482020
                                          • Opcode ID: fd6f94e864d29253667b71dd494519a6f50924d25f6d4f38d5e56928da0028a6
                                          • Instruction ID: b59f9697531d2ef8b70226b9500953704cc29be622e36c127e2b933b0920f7aa
                                          • Opcode Fuzzy Hash: fd6f94e864d29253667b71dd494519a6f50924d25f6d4f38d5e56928da0028a6
                                          • Instruction Fuzzy Hash: 84614B30E002189FEB549FA9C9547AEBAF6EF88700F208469D50AEB394DE758C458B95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1501 6639149-663917d 1503 663917f-6639182 1501->1503 1504 6639184-66391a3 1503->1504 1505 66391a8-66391ab 1503->1505 1504->1505 1506 66391b1-66391c6 1505->1506 1507 6639a6b-6639a6d 1505->1507 1514 66391c8-66391ce 1506->1514 1515 66391de-66391f4 1506->1515 1508 6639a74-6639a77 1507->1508 1509 6639a6f 1507->1509 1508->1503 1511 6639a7d-6639a87 1508->1511 1509->1508 1516 66391d2-66391d4 1514->1516 1517 66391d0 1514->1517 1519 66391ff-6639201 1515->1519 1516->1515 1517->1515 1520 6639203-6639209 1519->1520 1521 6639219-663928a 1519->1521 1522 663920b 1520->1522 1523 663920d-663920f 1520->1523 1532 66392b6-66392d2 1521->1532 1533 663928c-66392af 1521->1533 1522->1521 1523->1521 1538 66392d4-66392f7 1532->1538 1539 66392fe-6639319 1532->1539 1533->1532 1538->1539 1544 6639344-663935f 1539->1544 1545 663931b-663933d 1539->1545 1550 6639361-6639383 1544->1550 1551 663938a-6639394 1544->1551 1545->1544 1550->1551 1552 6639396-663939f 1551->1552 1553 66393a4-663941e 1551->1553 1552->1511 1559 6639420-663943e 1553->1559 1560 663946b-6639480 1553->1560 1564 6639440-663944f 1559->1564 1565 663945a-6639469 1559->1565 1560->1507 1564->1565 1565->1559 1565->1560
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: b165cb84d534d9f38115a5db727c2e22b06f901ac2654911de2d8b2d1a6e8e4d
                                          • Instruction ID: 51534cd6e821af4cd354de78c162e46973256c9f4b490242e6eadd9cf264e0fa
                                          • Opcode Fuzzy Hash: b165cb84d534d9f38115a5db727c2e22b06f901ac2654911de2d8b2d1a6e8e4d
                                          • Instruction Fuzzy Hash: B1514F30B142169FDB54DB74D990B6FB3FAEBC9304F108569C50AEB388EA70DC428B95
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0662B176
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 94189ed7886f23c4d930943845d7d22f1c167548088a8f1b60aad383850cd091
                                          • Instruction ID: ed615276ff9788b1bcbdc1ee4c28131e7e9403380a44fe0b52958101afef5abc
                                          • Opcode Fuzzy Hash: 94189ed7886f23c4d930943845d7d22f1c167548088a8f1b60aad383850cd091
                                          • Instruction Fuzzy Hash: 75813270A00B168FD7A4DF69D54075ABBF1FB88204F008A2ED49ADBB50D775E849CF94
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4098709556.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_27c0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e402983478a3326140081c95e691ec4a8776897957272a4efbd820df5cf32c3f
                                          • Instruction ID: d0a04d1b426cad6766b58bc542d46fd681799cb6cc82cbae5ff25c65cb598db0
                                          • Opcode Fuzzy Hash: e402983478a3326140081c95e691ec4a8776897957272a4efbd820df5cf32c3f
                                          • Instruction Fuzzy Hash: AF412272E003958FCB14DF79D8046EEBBF2AF89320F1485AED845A7250DB349885CBE1
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0662D202
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 5a8f038ad0fb796342c2ba520b4bcb5b9444affb3166cce8bdc8769819075dfe
                                          • Instruction ID: 8e1c2984ad38796a8f0fd7d695a1ca9886c199825d3657d313143a802c66f52c
                                          • Opcode Fuzzy Hash: 5a8f038ad0fb796342c2ba520b4bcb5b9444affb3166cce8bdc8769819075dfe
                                          • Instruction Fuzzy Hash: 6751D3B1D00759DFDB14CFA9C884ADEBFB5BF48310F24812AE818AB211D775A885CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0662D202
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 839650a77c8ad0e867be77ef1d12ff9daba30bf9a5047ffb9b2335b85a6351b3
                                          • Instruction ID: 9c0ae4cee509e33741944cb07429899d8575a83750ddef856ae0802d74f959f2
                                          • Opcode Fuzzy Hash: 839650a77c8ad0e867be77ef1d12ff9daba30bf9a5047ffb9b2335b85a6351b3
                                          • Instruction Fuzzy Hash: 3741B1B1D00359DFDB14CFA9C984ADEBBB5FF48310F24812AE818AB211D775A885CF91
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 0662F8F1
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: a935c6b0e4859bff1e22bb3481aab00bc1019a3668cf2afab1a3fab29ce5e085
                                          • Instruction ID: 94bf5019ded348746c10b4c07da6f7da6e79a1f399863dd0ad6c46a1e3208288
                                          • Opcode Fuzzy Hash: a935c6b0e4859bff1e22bb3481aab00bc1019a3668cf2afab1a3fab29ce5e085
                                          • Instruction Fuzzy Hash: F14126B4A00719DFDB54CF99C488AAAFBF5FB88314F24C459D519AB321D774A841CFA0
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06622B47
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e79321a5ea7ebcaeac6bd05d5d971ec008cf25fcbc82345394998698f91bddc8
                                          • Instruction ID: 6a1c22c5ab3ac62832328c3842713e4f20a0a081aa62dc4d795edba3474eeae3
                                          • Opcode Fuzzy Hash: e79321a5ea7ebcaeac6bd05d5d971ec008cf25fcbc82345394998698f91bddc8
                                          • Instruction Fuzzy Hash: 9D21E4B5D00259DFDB10CFAAD984ADEBBF5FB48310F14801AE914A7310D374A954CFA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06622B47
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: b3978eddc5da0a659368ad0bd939dfaa3aae64d1efa59b6f24e854d8e320a028
                                          • Instruction ID: 5b3dfd2880cc53188a22db9410219f34862c3ed9ca03b6812ab42da00249e5e3
                                          • Opcode Fuzzy Hash: b3978eddc5da0a659368ad0bd939dfaa3aae64d1efa59b6f24e854d8e320a028
                                          • Instruction Fuzzy Hash: F521E4B5900219DFDB10CFAAD984ADEFBF8FB48310F14801AE914A7310D374A944CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0662B1F1,00000800,00000000,00000000), ref: 0662B3E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: e1d604e5e8e2003db09d71fd0510935bb081c5008b8afe1bfe1ddc3d12ced04d
                                          • Instruction ID: 3937dbfdedeaf38ce9cbbdfdc0b7e09e2d5316061c90cd5644281094762da413
                                          • Opcode Fuzzy Hash: e1d604e5e8e2003db09d71fd0510935bb081c5008b8afe1bfe1ddc3d12ced04d
                                          • Instruction Fuzzy Hash: 961123B6D003599FCB10CFAAC844ADEFBF8FB48324F14842AE419A7210C375A945CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0662B1F1,00000800,00000000,00000000), ref: 0662B3E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: a0303657d753b56d8a4eed0591d44455cac12212a685303164de0db653df50b5
                                          • Instruction ID: 86baccf9e7b98a7b6d66404e455e1759d7f49a01cf176c58158ebf68e1a966e7
                                          • Opcode Fuzzy Hash: a0303657d753b56d8a4eed0591d44455cac12212a685303164de0db653df50b5
                                          • Instruction Fuzzy Hash: 981100B6900359DFDB10CFAAC444AEEFBF4FB48324F10842AE919A7210C375A945CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 027CEB9F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4098709556.00000000027C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_27c0000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: b811ecced08c7b74155e123e1fa55c1c2822bd090458502cba281e5345ce21e5
                                          • Instruction ID: aec9ce12380eb560e783d9e99b15d3c91ed2e1e3c59d63a1b388e6be051d1310
                                          • Opcode Fuzzy Hash: b811ecced08c7b74155e123e1fa55c1c2822bd090458502cba281e5345ce21e5
                                          • Instruction Fuzzy Hash: 571123B1C002699FCB10DFAAC544BDEFBF4BF48320F20816AD818A7251D378A944CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0662B176
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103158817.0000000006620000.00000040.00000800.00020000.00000000.sdmp, Offset: 06620000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6620000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 2643dcc246f2b8cb9f1a7a1d12cf2a96d920d4051ef6cc67c4bfb0d41b0021e1
                                          • Instruction ID: b877699d0b2ef4cd75bf4bb6118f95e0c1f6514917e3eca41bbc8f38129b49f0
                                          • Opcode Fuzzy Hash: 2643dcc246f2b8cb9f1a7a1d12cf2a96d920d4051ef6cc67c4bfb0d41b0021e1
                                          • Instruction Fuzzy Hash: B91102B5C006598FCB10DF9AC844ADEFBF4EB48214F10842AD418A7210C375A585CFA5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPcq
                                          • API String ID: 0-714321711
                                          • Opcode ID: d041c577c797b1cce3574b5e1e610ad99369db7888dfe100ed3199041c345b7d
                                          • Instruction ID: cf6d7180260e915df8de2f29621f0216d6b298635acdcdfb4f046992ba9ae6d2
                                          • Opcode Fuzzy Hash: d041c577c797b1cce3574b5e1e610ad99369db7888dfe100ed3199041c345b7d
                                          • Instruction Fuzzy Hash: DC517C30E102589FDB459FA9C854BAEBBF7EF88700F20856AD146EB395DA708C458F91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: aedc15aa3afb1447f9aa43dcf68e2875fd260d626eca8ad532b2e0c6483f808e
                                          • Instruction ID: cf48f15da138f9ba5136a820db43a9a9829820941ba2721489f68e72c63c7565
                                          • Opcode Fuzzy Hash: aedc15aa3afb1447f9aa43dcf68e2875fd260d626eca8ad532b2e0c6483f808e
                                          • Instruction Fuzzy Hash: 1641BD70E00319DFDB65DFA5C4946AEBBB6BF85300F208929D406EB344DB70E946CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q
                                          • API String ID: 0-2549759414
                                          • Opcode ID: f73eb3b7c1a6094945a5b166ed9f3fb4452154ee27a0916f6159693964bdd399
                                          • Instruction ID: 67819351688d567f3879cb25b71b18e7dea4c29ff1e80d5d01ad259c12df019a
                                          • Opcode Fuzzy Hash: f73eb3b7c1a6094945a5b166ed9f3fb4452154ee27a0916f6159693964bdd399
                                          • Instruction Fuzzy Hash: 6131E330B042158FDB59AB74DA6466F7BE7AF89300F20852CD406DB398EE35DD46CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q
                                          • API String ID: 0-388095546
                                          • Opcode ID: 3f9d16dfb9aa4265b8c81ccb3dd69e236013c3fb76d8afba8a199fb968306f0c
                                          • Instruction ID: 897d8258f6b572a1804da3ae035bbc932f34b20747afc7391abd8978a3e9b841
                                          • Opcode Fuzzy Hash: 3f9d16dfb9aa4265b8c81ccb3dd69e236013c3fb76d8afba8a199fb968306f0c
                                          • Instruction Fuzzy Hash: D7F0AF31A08221CFEFA89A94EA806FC73A5EB80310F14446DE909CB345D731DE46C791
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5f598c459120f918910080589fed402f8cd1b378db1f7185a69d47c127ceb095
                                          • Instruction ID: d3454cd4b86626a528b31fb4c69b9092cde03b4fa708faf3e3244125b4e52686
                                          • Opcode Fuzzy Hash: 5f598c459120f918910080589fed402f8cd1b378db1f7185a69d47c127ceb095
                                          • Instruction Fuzzy Hash: 7D61BF71F000215FCF509A7EC88466FAAD7AFC4620B26443AD80EDB364EEA5DD0287D2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87e996ec73de2e7cff3d093756f698ad6804bbf814e1720e3aafba118fbee3eb
                                          • Instruction ID: 6a57fc14a6914eb20b0d9d16a21656a51c34d91b6cbdfc770d8e87dc9a7a545d
                                          • Opcode Fuzzy Hash: 87e996ec73de2e7cff3d093756f698ad6804bbf814e1720e3aafba118fbee3eb
                                          • Instruction Fuzzy Hash: 1C815A30B002199FDF54DFA9D5906AEB7F2AF89304F148529D50AEB395EF30EC468B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 621f4325a1a508a297e29c2e97e4b7e3aa7ea176ed7ab49e7df64e23181b901a
                                          • Instruction ID: 660c39153e1de572ede3c892386e2eef5541931e81d9e22ffbc9de0bb9094d71
                                          • Opcode Fuzzy Hash: 621f4325a1a508a297e29c2e97e4b7e3aa7ea176ed7ab49e7df64e23181b901a
                                          • Instruction Fuzzy Hash: 23914C30E102198BDF60DF68C890B9DF7B1FF89300F208599D549AB355DB71A985CF91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf1464177badd5ea5c1f4efea11cd5f0958cd5230cc5a1a2e686a8e6ab64742d
                                          • Instruction ID: 208fc71b25ae2d13f3a50ca94975a73e61e01b96024a7599a6c25c0f302f8304
                                          • Opcode Fuzzy Hash: bf1464177badd5ea5c1f4efea11cd5f0958cd5230cc5a1a2e686a8e6ab64742d
                                          • Instruction Fuzzy Hash: 31715B31E1021A8FCF55DFA8D5806AEB7B2FFC5304F108529D90AAB354EB75D84A8B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c4b69e7bb92ca7bfdd8d1c6f17ce868451bc43b8743762d1dd4fb964acbc43ea
                                          • Instruction ID: 584db4676c5e1b3cf8f254f27c8e6c8c147b8806eed84e1b02d8106bf435b317
                                          • Opcode Fuzzy Hash: c4b69e7bb92ca7bfdd8d1c6f17ce868451bc43b8743762d1dd4fb964acbc43ea
                                          • Instruction Fuzzy Hash: 47914E34E102198BDF60DF68C890B9DF7B2FF89300F208599D549AB355EB71AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6e4ccc307a4e8a21131d757a3bc5f9e4f158835c7367b687c8de1d9a9d631bd
                                          • Instruction ID: 062afd538b679e5ed49e29e9de4633cba7dbc7588b75bc48b8714e0f5f5f1fea
                                          • Opcode Fuzzy Hash: b6e4ccc307a4e8a21131d757a3bc5f9e4f158835c7367b687c8de1d9a9d631bd
                                          • Instruction Fuzzy Hash: 3F61E331E01219DFDF54AF78E8546AEBBB2EB84315F10887AE50ADB350DB358855CB90
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b7352f78370b29db4e8992b44d126a2bebb843c2c60412f07df6db0b080e509f
                                          • Instruction ID: a34c3dc69440f3a5a60d46fca3ddde3af58b1d9643e5b231b0d665f336707f59
                                          • Opcode Fuzzy Hash: b7352f78370b29db4e8992b44d126a2bebb843c2c60412f07df6db0b080e509f
                                          • Instruction Fuzzy Hash: E4713F30A012189FDB55DBA9D980AAEFBF6FF84310F24846AD016EB354DB31EC46CB50
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d9788347c0e73c719e6cc4999b4f14ed92938b1764e34c345fd6f768a7ed8c6c
                                          • Instruction ID: 31079e2a6f35febea81a0b5a2a4c1fd92880192de30ea576befc54f9f38b3b02
                                          • Opcode Fuzzy Hash: d9788347c0e73c719e6cc4999b4f14ed92938b1764e34c345fd6f768a7ed8c6c
                                          • Instruction Fuzzy Hash: 08711C30A012189FDB55DFA9D980AAEFBF6EF84300F24846AD016EB354DB31EC46CB54
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 226f60a285d357e588dd1901466b0bea631f1878a0fbbe609e91d2ae2e313a9b
                                          • Instruction ID: 8f5a92446cf3ffe3bf795b701368d1fab066f8082f5f0a43f44afb48f7eaefac
                                          • Opcode Fuzzy Hash: 226f60a285d357e588dd1901466b0bea631f1878a0fbbe609e91d2ae2e313a9b
                                          • Instruction Fuzzy Hash: EA51A770F11324DFEF646A6CD95476F369ED789310F20482AE10ADB3D5CA79CC8987A2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5ab922c1a9581a11f8087121989e9471dc8df67d2f5fcb036f58068ed4c5d716
                                          • Instruction ID: 6292b298dcee0af0b6efc88da9d93fbf38e2f41592c03adc1c5a1ce8324623cf
                                          • Opcode Fuzzy Hash: 5ab922c1a9581a11f8087121989e9471dc8df67d2f5fcb036f58068ed4c5d716
                                          • Instruction Fuzzy Hash: 13519670F11224DFEF646A6CD95472F369ED789310F20482AE10BDB3D9CA79CC8587A2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cf720f539674fd7d990ac617f74c8e542e808b0a645b35e48bd2fc72befee494
                                          • Instruction ID: eb1ea30f7f4cdfc7ac991df4a606b71aac62f24be23055870e8c68026210550e
                                          • Opcode Fuzzy Hash: cf720f539674fd7d990ac617f74c8e542e808b0a645b35e48bd2fc72befee494
                                          • Instruction Fuzzy Hash: F8417C71E002199FCF70CFA9D8C0AAFFBB2EB84310F10492AE15AD7251D330E8598B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c3e1e82999cbe411bb10117f79fea29a4d43536d1d87072ce2069346e8367e79
                                          • Instruction ID: 48782d2168e6eca75d61937f948a86b3eeb1b427cc2859e0223e6384aa120f26
                                          • Opcode Fuzzy Hash: c3e1e82999cbe411bb10117f79fea29a4d43536d1d87072ce2069346e8367e79
                                          • Instruction Fuzzy Hash: 0231E431E1431A9FCF11DF69D98069EFBB6FF85304F148529E805AB344EB70E8468B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 95647e62318db0f0504394ddd9483f1d420839cbb27513c173cd75bbeb52580e
                                          • Instruction ID: e53d8df1dbadf08f4a6e4c71be6ffb1fbff775fe7c2ced2f49bb10c1a835d8eb
                                          • Opcode Fuzzy Hash: 95647e62318db0f0504394ddd9483f1d420839cbb27513c173cd75bbeb52580e
                                          • Instruction Fuzzy Hash: A7319230E102169FCB55CF68D8646AEB7F6FF89300F148529EA06E7350DB71AD86CB50
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1f5a51cc4c534ad9ab0d5303a11d93456870069c6cfdecac7e47d6284521de42
                                          • Instruction ID: 1bc17c4b01d12b0459b20c01f8c18726a2266d85b59430c42195c7d8f95deec0
                                          • Opcode Fuzzy Hash: 1f5a51cc4c534ad9ab0d5303a11d93456870069c6cfdecac7e47d6284521de42
                                          • Instruction Fuzzy Hash: DA318F30E102169FCB55CF64D8A46AEB7B6FF89300F14C529E906EB350DB71AD86CB50
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d79865e1dd5a72cf776782c0cb213fd816d854e5e0fd8f4179f6ef44f4c44e6a
                                          • Instruction ID: 86be5c4f208cd75c4b614bfa9129212236da2d43719e34bd6f978f69f0af07ec
                                          • Opcode Fuzzy Hash: d79865e1dd5a72cf776782c0cb213fd816d854e5e0fd8f4179f6ef44f4c44e6a
                                          • Instruction Fuzzy Hash: 94219D75F056659FDB40DFB9D980AAEBBF6EB48710F108029E905EB384E730D9018B94
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06335159e49cfbc4ba56566360477c2937cc6c6cf1d68eef5c1ae40e4a4093b5
                                          • Instruction ID: a7b8870e49b207678af5282039cced5f81ca5ee5b236eacddd6ff60178262fbd
                                          • Opcode Fuzzy Hash: 06335159e49cfbc4ba56566360477c2937cc6c6cf1d68eef5c1ae40e4a4093b5
                                          • Instruction Fuzzy Hash: 62218071F146659FDB50DF79D980AAEBBF6EB4C710F108029E905EB385E730D9028B94
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4098486530.00000000026FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_26fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07424ff6bf171332834ae51a6214f1b536826cb76310b82bd5652c12602bdef1
                                          • Instruction ID: 5b3e0bc8b219980636d6d7efe20eb2817fc7c13d5e3d33284de3e6736c283c6c
                                          • Opcode Fuzzy Hash: 07424ff6bf171332834ae51a6214f1b536826cb76310b82bd5652c12602bdef1
                                          • Instruction Fuzzy Hash: D6213471504280DFDF54DF14D9C0B26BBA5FB84314F20C56DDA0A4B796C33AE447CA62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4098486530.00000000026FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026FD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_26fd000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b04810cc87487e7f090394aa1035f8efb6029ac7fa1327d424cac4252407c721
                                          • Instruction ID: 77965a4151891d5f35127dfff0cf45733951e0df1e210e101fef6af2211ede9c
                                          • Opcode Fuzzy Hash: b04810cc87487e7f090394aa1035f8efb6029ac7fa1327d424cac4252407c721
                                          • Instruction Fuzzy Hash: D52128715093C09FCB03CF24D994711BF71AB46214F29C5DBD9898F6A7C33A985ACB62
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a26f2391b0ba7063d25f471ec7a2130686bc28dfb156ea93f4813d16f175345
                                          • Instruction ID: e05cccc93daa982ba0f5dd46332abd0ae1e5b1c8cf0658f47f2d781db33d90ee
                                          • Opcode Fuzzy Hash: 5a26f2391b0ba7063d25f471ec7a2130686bc28dfb156ea93f4813d16f175345
                                          • Instruction Fuzzy Hash: 2511D231B041601FDB5186BDD950B2BFBDBDBCA610F18847AE50ADB381DD51DC4243A6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78a43eb13b4c982a990035fd53236c4e10bd854ce465ebe6a4c343665de279f9
                                          • Instruction ID: 7dc639c85bb84076226dd2c8256e1faecc1da4705246e8e99392ae673dbf5aba
                                          • Opcode Fuzzy Hash: 78a43eb13b4c982a990035fd53236c4e10bd854ce465ebe6a4c343665de279f9
                                          • Instruction Fuzzy Hash: 2411A131B141285FDB549A68D8146AF73AAABC8710F00853AC90AEB340EF34DC028B91
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5eea01f1e144addc7f548193c2c5bfd2f729a2b5f46dd333abb85b3cdb8cff4b
                                          • Instruction ID: 2f423ff2362d30bdfbd64a164b02a1192af7d8e3c54f39485d62c746db6609c0
                                          • Opcode Fuzzy Hash: 5eea01f1e144addc7f548193c2c5bfd2f729a2b5f46dd333abb85b3cdb8cff4b
                                          • Instruction Fuzzy Hash: F421BFB5D01259AFCB10DF9AD884ADEFFB4FB48320F10852AE918A7241D374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1bc18b5245472f93c970d4c789d242ff68bac86b5500254625ad718c5698ba20
                                          • Instruction ID: 79892119500806605360068e6441b96eecfb92d04b1354128b48bc1f3192e39b
                                          • Opcode Fuzzy Hash: 1bc18b5245472f93c970d4c789d242ff68bac86b5500254625ad718c5698ba20
                                          • Instruction Fuzzy Hash: C3014C30B046601FEB11D6B8E850B3FB7DAEB8B710F10443EE14ACB391DA11DD018395
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aa6c79fbd0eab8fe4d13afd4c4f41bbe810b71ddfd71b4bd8d9f7da64e6cfc48
                                          • Instruction ID: 4f3527f9f276237698174dd384c3f1363a7f91c9af64ab92b6a46923e8bc089c
                                          • Opcode Fuzzy Hash: aa6c79fbd0eab8fe4d13afd4c4f41bbe810b71ddfd71b4bd8d9f7da64e6cfc48
                                          • Instruction Fuzzy Hash: 6801B531B142115FCB61D67CE450B3BB7DADBC9614F14883AE50AC7341D952EC0247A6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0bec4da402239be4ab9221acc8b850a237ba0a42e18f219638ac3e8551bc3e9
                                          • Instruction ID: 3fd0ea588fbb0a3f192f12033fa8ba3d91f27f9788c35e811007d7c813a58a9e
                                          • Opcode Fuzzy Hash: a0bec4da402239be4ab9221acc8b850a237ba0a42e18f219638ac3e8551bc3e9
                                          • Instruction Fuzzy Hash: 18018432B141685FDB549669DD506EF77AA9BC8614F00413BD50AE7380EF65DC0247D2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac487f052c022a42901a4e9312fc8e2cbba5778bb2f0855d8e17346939c15740
                                          • Instruction ID: 446e1498e8ed1fef29d536298dd82167965a1ef31221b5739d4b6d94e6c30b84
                                          • Opcode Fuzzy Hash: ac487f052c022a42901a4e9312fc8e2cbba5778bb2f0855d8e17346939c15740
                                          • Instruction Fuzzy Hash: 8811C0B1D01259AFCB00DF9AD884ACEFBB4FB48310F10812AE518A7240D374A954CFA5
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1a90f5b98b2346d9313e075f3b49ef7fdd145760da545e8de479d6840d739f11
                                          • Instruction ID: 95a72f5f8f0a49511ed916003c8b4dba6eaf999615f9e7998ac0402b16161203
                                          • Opcode Fuzzy Hash: 1a90f5b98b2346d9313e075f3b49ef7fdd145760da545e8de479d6840d739f11
                                          • Instruction Fuzzy Hash: DA01AD31B100200BDB6095AED500B2FF3DBDBC9710F108439E50EDB380DD61DC424395
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a08537956de551a735cc0ac1f7aaf1be15fb6bcc49c78064ed6491189e20312
                                          • Instruction ID: 488fd5c243a0dd2e5a5a4f8784cca57ba75a88fa368b275ce161640a1b09f008
                                          • Opcode Fuzzy Hash: 0a08537956de551a735cc0ac1f7aaf1be15fb6bcc49c78064ed6491189e20312
                                          • Instruction Fuzzy Hash: 10016931B101215BCA64967DE45073EB2DADBC9614F10883AE60ACB380EA66EC0247A6
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b576674ca849556b4f663a056a680f2cfe74d09022f597c416155996f15ece5b
                                          • Instruction ID: e1be535bc1c14baeab0aad8e0560ba8ad6ea24f9f9e1487434ed5131b73fa66e
                                          • Opcode Fuzzy Hash: b576674ca849556b4f663a056a680f2cfe74d09022f597c416155996f15ece5b
                                          • Instruction Fuzzy Hash: 0E013130B105205BDB64D6B8E45473FB3DAEB8A754F108839E54ACB394EA21DC019795
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab1712de3f506d39cfb0144f184ae9db2bc5b5de08cee5ec63099a6cbc9046ed
                                          • Instruction ID: 1507487e22311a1ade49f362696441ae86efa97fa405cd76d9a185ebefe8abf9
                                          • Opcode Fuzzy Hash: ab1712de3f506d39cfb0144f184ae9db2bc5b5de08cee5ec63099a6cbc9046ed
                                          • Instruction Fuzzy Hash: F2E09271E553987FDB50DEB4CE1565ABBAD9B02208F1488A6D405DB283E176CE018380
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-2222239885
                                          • Opcode ID: 86aa3da845cea42153c82bb0c2f942589f8d2d40c3ba1f302b76c3c281586b2c
                                          • Instruction ID: ff62ea725b4014f00315418d2f6de9c8347f2689af14a34673d1cd810636722b
                                          • Opcode Fuzzy Hash: 86aa3da845cea42153c82bb0c2f942589f8d2d40c3ba1f302b76c3c281586b2c
                                          • Instruction Fuzzy Hash: 7C120E70E00229CFDB65DF69C954A9DBBF2BF88304F208569D40AAB354DB309D86CF95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-3823777903
                                          • Opcode ID: b107b592dc932042b112a1bcc709ec95f62ebfb2b8dfae9e004d1c38fd98c8d4
                                          • Instruction ID: bf2e83ea381247bfd4d08cefa024e36d941abd3f274e60186df8f8fc2ce13bfb
                                          • Opcode Fuzzy Hash: b107b592dc932042b112a1bcc709ec95f62ebfb2b8dfae9e004d1c38fd98c8d4
                                          • Instruction Fuzzy Hash: 78918F30E10219DFDB68DFA5DA84B6EB7F6BF84304F108529D482AB394DB359C45DB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                          • API String ID: 0-390881366
                                          • Opcode ID: 5e64532d60f2b40260dbbdb764272434ad87bbf3d37b6756142e28956ac18b9c
                                          • Instruction ID: 9f028615459785c7200c7d5f1344ac45bca9ca58dced4a0e981cdbc90106f861
                                          • Opcode Fuzzy Hash: 5e64532d60f2b40260dbbdb764272434ad87bbf3d37b6756142e28956ac18b9c
                                          • Instruction Fuzzy Hash: 3FF13B70A04218CFDB59EB69D594A6EBBB3BF84304F248568D4069B358DB31EC86CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q$$^q$$^q
                                          • API String ID: 0-2125118731
                                          • Opcode ID: 508de1c62e8802a765ae5f6ddb356a0124973b71e381f90e1f8c4f6d09798659
                                          • Instruction ID: 683ae962a76d043bad1fa0008da4d0c6dd52c6bf591f2932443b826478178663
                                          • Opcode Fuzzy Hash: 508de1c62e8802a765ae5f6ddb356a0124973b71e381f90e1f8c4f6d09798659
                                          • Instruction Fuzzy Hash: 2EB14A30A10218CFDB54EB79D5946AEB7B3EF84304F24886DE0069B399DB75DC86CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.4103212532.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_6630000_Catalina - Particulars.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR^q$LR^q$$^q$$^q
                                          • API String ID: 0-2454687669
                                          • Opcode ID: d37ada0642d8596b00a3d74b43823cd47350be85cf64d073d558fe6563761705
                                          • Instruction ID: 956297aafd32b8825629d520c0ec03fd7d7813b0410f36f4ca97c44033f79a46
                                          • Opcode Fuzzy Hash: d37ada0642d8596b00a3d74b43823cd47350be85cf64d073d558fe6563761705
                                          • Instruction Fuzzy Hash: 8651C030B002119FDB58EF68D944AAAB7E6FF88304F1485ACE4069F3A5DB30EC45CB95