Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
Analysis ID:1430705
MD5:2d41e117f7b73d3b0b8804794b4fe9dd
SHA1:f0bd15035e0bf67f621c7e87c65b62c007e79fda
SHA256:5b88fdc4c1564305f8883e5ec48cadea105d082a5a1bae6a17c57c81c01069a7
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Enables security privileges
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe (PID: 6300 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe" MD5: 2D41E117F7B73D3B0B8804794B4FE9DD)
    • conhost.exe (PID: 1076 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 3608 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            3.2.MSBuild.exe.400000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              3.2.MSBuild.exe.400000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                3.2.MSBuild.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  3.2.MSBuild.exe.400000.0.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
                  • 0x510bb:$s1: file:///
                  • 0x50ff3:$s2: {11111-22222-10009-11112}
                  • 0x5104b:$s3: {11111-22222-50001-00000}
                  • 0x4dbc3:$s4: get_Module
                  • 0x48dc9:$s5: Reverse
                  • 0x49662:$s6: BlockCopy
                  • 0x48db1:$s7: ReadByte
                  • 0x510cd:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
                  0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                    Click to see the 11 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\AppData\Roaming\d3d9.dllVirustotal: Detection: 51%Perma Link
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeVirustotal: Detection: 49%Perma Link
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeReversingLabs: Detection: 31%
                    Source: C:\Users\user\AppData\Roaming\d3d9.dllJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeJoe Sandbox ML: detected
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE99F48 FindFirstFileExW,0_2_6CE99F48
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: unknownTCP traffic detected without corresponding DNS query: 23.1.237.91
                    Source: MSBuild.exe, 00000003.00000002.2021726688.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $sq3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\sq equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000003.00000002.2021726688.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000003.00000002.2021726688.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\sq equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000003.00000002.2021726688.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`,sq equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000003.00000002.2021726688.00000000028CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,sq#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000289E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000289E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                    Source: MSBuild.exe, 00000003.00000002.2021726688.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_a5581eb7-f
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp6D6D.tmpJump to dropped file
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp6D5D.tmpJump to dropped file

                    System Summary

                    barindex
                    Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: section name: .{_x}
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: section name: .Z%j5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE91C80 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,GetModuleHandleW,GetProcAddress,0_2_6CE91C80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF5C20 NtProtectVirtualMemory,0_2_02EF5C20
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF6100 NtAllocateVirtualMemory,0_2_02EF6100
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF60DD NtAllocateVirtualMemory,0_2_02EF60DD
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF5C1F NtProtectVirtualMemory,0_2_02EF5C1F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE91C800_2_6CE91C80
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE923500_2_6CE92350
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CEA04E50_2_6CEA04E5
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE910000_2_6CE91000
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE948100_2_6CE94810
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE912200_2_6CE91220
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_013690200_2_01369020
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_013610980_2_01361098
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136E0D00_2_0136E0D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_01369B000_2_01369B00
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136DBD00_2_0136DBD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136C2280_2_0136C228
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_013692180_2_01369218
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136B6B80_2_0136B6B8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136A12A0_2_0136A12A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136A1480_2_0136A148
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_013690100_2_01369010
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136920A0_2_0136920A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136A2AF0_2_0136A2AF
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136A2C00_2_0136A2C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136DD300_2_0136DD30
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136BD2A0_2_0136BD2A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136A47F0_2_0136A47F
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_01368FB00_2_01368FB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136DFD00_2_0136DFD0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_0136D6090_2_0136D609
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF9E9A0_2_02EF9E9A
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF9BF80_2_02EF9BF8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF00400_2_02EF0040
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF74000_2_02EF7400
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF2DB00_2_02EF2DB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF99000_2_02EF9900
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF36C00_2_02EF36C0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF36D00_2_02EF36D0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF8AB00_2_02EF8AB0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF26500_2_02EF2650
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF32200_2_02EF3220
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF2B780_2_02EF2B78
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF93200_2_02EF9320
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF4F000_2_02EF4F00
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF54E80_2_02EF54E8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF3CE00_2_02EF3CE0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF84C80_2_02EF84C8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF84B90_2_02EF84B9
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF44B00_2_02EF44B0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF00060_2_02EF0006
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF95D80_2_02EF95D8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF2DA00_2_02EF2DA0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF39480_2_02EF3948
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF39580_2_02EF3958
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF69200_2_02EF6920
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF69100_2_02EF6910
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B7E3E83_2_00B7E3E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B7E3D83_2_00B7E3D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B708783_2_00B70878
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B708683_2_00B70868
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B72CE43_2_00B72CE4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00B74DD03_2_00B74DD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: SecurityJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: String function: 6CE95A70 appears 33 times
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe, 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenameRenowning.exe" vs SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe, 00000000.00000002.2008317345.00000000010D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe, 00000000.00000000.1999217761.0000000000B46000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameasca1ex_crypted.exeT vs SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeBinary or memory string: OriginalFilenameasca1ex_crypted.exeT vs SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, mLrwBjaNEgFvrhaGTgv.csCryptographic APIs: 'CreateDecryptor'
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, TaskParameter.csTask registration methods: 'CreateNewTaskItemFrom'
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, OutOfProcTaskHostNode.csTask registration methods: 'RegisterTaskObject', 'UnregisterPacketHandler', 'RegisterPacketHandler', 'UnregisterTaskObject', 'GetRegisteredTaskObject'
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, TaskLoader.csTask registration methods: 'CreateTask'
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, RegisteredTaskObjectCacheBase.csTask registration methods: 'GetLazyCollectionForLifetime', 'RegisterTaskObject', 'DisposeObjects', 'IsCollectionEmptyOrUncreated', 'UnregisterTaskObject', 'DisposeCacheObjects', 'GetRegisteredTaskObject', 'GetCollectionForLifetime'
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, Strings.csBase64 encoded string: 'GSk+Lyw0PSESIjU7AQ8FJDM7DA46MyEwJT0lBCEOAVU0QBUHLwJBVDAmGyERJAc5MSsRHTFAJhkuH1Nc'
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, CommunicationsUtilities.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent(bool)
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, NodeEndpointOutOfProcBase.csSecurity API names: System.IO.Pipes.PipeSecurity.AddAccessRule(System.IO.Pipes.PipeAccessRule)
                    Source: 3.2.MSBuild.exe.3849970.1.raw.unpack, NodeEndpointOutOfProcBase.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: .configAMSBUILDDIRECTORYDELETERETRYCOUNTCMSBUILDDIRECTORYDELETRETRYTIMEOUT.sln
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: *.sln
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBuild MyApp.csproj /t:Clean
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: /ignoreprojectextensions:.sln
                    Source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MSBUILD : error MSB1048: Solution files cannot be debugged directly. Run MSBuild first with an environment variable MSBUILDEMITSOLUTION=1 to create a corresponding ".sln.metaproj" file. Then debug that.
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/7@0/0
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to behavior
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1076:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6A9D.tmpJump to behavior
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile read: C:\Program Files (x86)\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeVirustotal: Detection: 49%
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeReversingLabs: Detection: 31%
                    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: esdsip.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: linkinfo.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00021401-0000-0000-C000-000000000046}\InProcServer32Jump to behavior
                    Source: Google Chrome.lnk.3.drLNK file: ..\..\..\Program Files\Google\Chrome\Application\chrome.exe
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic file information: File size 4988416 > 1048576
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: Raw size of .OKDa is bigger than: 0x100000 < 0x4c0e00
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb source: MSBuild.exe, 00000003.00000002.2027925622.0000000003841000.00000004.00000800.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, mLrwBjaNEgFvrhaGTgv.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, G8WxH38hhBnr1IE68vI.cs.Net Code: lrPIYdBHH0
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, G8WxH38hhBnr1IE68vI.cs.Net Code: kKcFHrrDYN
                    Source: initial sampleStatic PE information: section where entry point is pointing to: .OKDa
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: section name: .{_x}
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: section name: .Z%j5
                    Source: SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeStatic PE information: section name: .OKDa
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CEA0C14 push ecx; ret 0_2_6CEA0C27
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_02EF1F40 push esp; iretd 0_2_02EF1F41
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, G8WxH38hhBnr1IE68vI.csHigh entropy of concatenated method names: 'uYP5UMy1hu', 'nt15Ceoiwh', 'opo5rgGLQg', 'gA95bU2ExD', 'Rks5BkBZi5', 'ADm5J0cpqR', 'NaM52ZqZyD', 'THoZbd2fUw', 'Y8N5itYb3g', 'Wb65MvkIMT'
                    Source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, mLrwBjaNEgFvrhaGTgv.csHigh entropy of concatenated method names: 'oQG8WrDol0', 'g38PJ8K3c0', 'jBH8UdC1PV', 'UlO8CDfJsQ', 'hcC8rW5pKa', 'mN58bMtfWM', 'ts3XxWXD9Z', 'OigaEK3D3W', 'jroa4iUVTS', 'B6saGICwMv'

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 BlobJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,SQ
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\SQ
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 1360000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 2F80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 2DD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 53C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 73C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 7600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: 9600000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: B70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4840000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe TID: 5536Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6464Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE99F48 FindFirstFileExW,0_2_6CE99F48
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\sq
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,sq
                    Source: MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                    Source: MSBuild.exe, 00000003.00000002.2031047933.00000000074AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE958FA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE958FA
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE9B66B GetProcessHeap,0_2_6CE9B66B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE958FA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE958FA
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE99897 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CE99897
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE95421 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6CE95421
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE92350 MSIGame,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,ReadProcessMemory,ReadProcessMemory,WriteProcessMemory,CloseHandle,CloseHandle,0_2_6CE92350
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 462000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 4BE000Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 6C3008Jump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: MSBuild.exe, 00000003.00000002.2021726688.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                    Source: MSBuild.exe, 00000003.00000002.2021726688.0000000002A4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE95AB8 cpuid 0_2_6CE95AB8
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exeCode function: 0_2_6CE95543 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CE95543
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6cea8000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe.6ce90000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Scheduled Task/Job
                    1
                    Scheduled Task/Job
                    412
                    Process Injection
                    1
                    Masquerading
                    11
                    Input Capture
                    1
                    System Time Discovery
                    Remote Services11
                    Input Capture
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory221
                    Security Software Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    1
                    Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                    Process Injection
                    NTDS31
                    Virtualization/Sandbox Evasion
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                    Deobfuscate/Decode Files or Information
                    LSA Secrets2
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Obfuscated Files or Information
                    Cached Domain Credentials23
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Install Root Certificate
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                    Software Packing
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    DLL Side-Loading
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe49%VirustotalBrowse
                    SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe32%ReversingLabsWin32.Trojan.CrypterX
                    SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\d3d9.dll100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\d3d9.dll51%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bg.microsoft.map.fastly.net0%VirustotalBrowse
                    fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ip.sb/ip0%URL Reputationsafe
                    https://api.ip.s0%Avira URL Cloudsafe
                    https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                    https://discord.com/api/v9/users/0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalseunknown
                    fp2e7a.wpc.phicdn.net
                    192.229.211.108
                    truefalseunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ip.sb/ipMSBuild.exe, 00000003.00000002.2021726688.000000000289E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ip.sMSBuild.exe, 00000003.00000002.2021726688.000000000289E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/v9/users/MSBuild.exe, 00000003.00000002.2021726688.000000000294A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1430705
                    Start date and time:2024-04-24 03:30:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 34s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@4/7@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 69
                    • Number of non-executed functions: 51
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 104.122.28.179, 20.114.59.183, 72.21.81.240, 199.232.210.172, 192.229.211.108, 52.165.164.15, 40.127.169.103
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wu-bg-shim.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    No simulations
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    fp2e7a.wpc.phicdn.netScreenConnect.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 192.229.211.108
                    ScreenConnect.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 192.229.211.108
                    SecuriteInfo.com.Python.Stealer.1437.14994.32063.exeGet hashmaliciousPython StealerBrowse
                    • 192.229.211.108
                    https://www.longin-eki.co.jp.cduhzkc.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    https://www.longin-eki.co.jp.nebxshr.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    https://www.admin-longin.co.jp.mc3lva.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    https://www.longin.co.jp.wiibhaq.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    https://emv1.3rujia.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    https://wmicrosouab-4ba8.udydzj.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                    • 192.229.211.108
                    https://www.longin-eki.co.jp.zurxyjp.cn/Get hashmaliciousUnknownBrowse
                    • 192.229.211.108
                    bg.microsoft.map.fastly.netScreenConnect.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.210.172
                    6W9hpMEmjY.exeGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    6W9hpMEmjY.exeGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    cncUVRcGoI.exeGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://www.admin-longin.co.jp.mc3lva.cn/Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://www.longin-eki.co.jp.zurxyjp.cn/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://xxnewmac5xx.z13.web.core.windows.net/Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://windowdefalerts-error0x21916-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                    • 199.232.210.172
                    https://windowdefalerts-error0x21915-alert-virus-detected.pages.dev/Get hashmaliciousHTMLPhisher, TechSupportScamBrowse
                    • 199.232.210.172
                    https://netorg442802-my.sharepoint.com/:b:/g/personal/darek_daronto_com/EeXtnEaZ3XJBqGk13it6odUB-K9vuYAC7zp7SfyciZ3BpQ?e=nkKu2wGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    No context
                    No context
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:53 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                    Category:dropped
                    Size (bytes):2106
                    Entropy (8bit):3.445666597951605
                    Encrypted:false
                    SSDEEP:48:8S0l2dfTXd3RYrnvPdAKRkdAs6IdAKRFdAKRE:8S0lOw
                    MD5:86451F73A23786D7FA8F015CFF75EC69
                    SHA1:83B116DE0CB8966FEFCFC5E6C2800E8F2D8A338C
                    SHA-256:D014BEF9DA82C968A3760B55FEFDAE0FBE641E623A40A07EBD5B2F6BEE060620
                    SHA-512:DB9366827BFAE1DBE7E4418E793963F9FD7C164BC14A82208206D30ACD204EE69E897D6A15FBDE989CF8AE5DF5668CD7D40F1BC2DD68E0080BD2DA10085B898B
                    Malicious:false
                    Reputation:low
                    Preview:L..................F.@.. ......,....6e.l.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.".-.-.p.r.o.x.y.-.s.e.r.v.e.r
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1299
                    Entropy (8bit):5.342376182732888
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4xLE4qE4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0H6
                    MD5:D62639C5676A8FA1A0C2215824B6553A
                    SHA1:544B2C6E7A43CE06B68DF441CC237AB7A742B5CD
                    SHA-256:761379FF547D28D053F7683499D25F7F1B5523CC7262A2DA64AF26448F7E2D76
                    SHA-512:5B46D1BDB899D8FA5C7431CA7061CDD1F00BE14CD53B630FAB52E52DA20F4B2BED405F932D7C0E9D74D84129D5BB5DE9B32CC709DA3D6995423E2ED91E92ACD3
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    File Type:CSV text
                    Category:dropped
                    Size (bytes):226
                    Entropy (8bit):5.360398796477698
                    Encrypted:false
                    SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                    MD5:3A8957C6382192B71471BD14359D0B12
                    SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                    SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                    SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2662
                    Entropy (8bit):7.8230547059446645
                    Encrypted:false
                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2662
                    Entropy (8bit):7.8230547059446645
                    Encrypted:false
                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):2251
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:0158FE9CEAD91D1B027B795984737614
                    SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                    SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                    SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):866816
                    Entropy (8bit):5.757237855888856
                    Encrypted:false
                    SSDEEP:12288:8tSX+xi19hdEmUUqS8nm8M83SN4hyhUstTN:rM2EmUSgBM3+i
                    MD5:D0B35E6C99D48C4456DB3F9FEE7D25E7
                    SHA1:9B1C74529BF52607BB37BD6F2161DD8B442E77B9
                    SHA-256:550E9CE8DE15B9EF48F7F54DF4075468B9DEE17BFDBC53F7D65CF039EF1C86DE
                    SHA-512:E03976B1B902B7F9590811B84D58F99F09CD38469D6B96D8176C3F17D4C4C92BEAFE73BD4A77D3874529E47403C52992DD216F643B0D70F9ACBAAEB25F7F8A43
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: Virustotal, Detection: 51%, Browse
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............kQ..kQ..kQ..hP..kQ..nPr.kQ..oP..kQ..jP..kQ..jQ..kQ.jnP..kQ.joP..kQ.jhP..kQ..kQ..kQ.jkP..kQ.jiP..kQRich..kQ................PE..L.....(f...........!...&.....@.......S.......................................p............@..........................j..P...Pj..(............................P..(...._..............................@^..@...............@............................text...c........................... ..`.rdata...a.......b..................@..@.data...d............f..............@....reloc..(....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.476466811694825
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    • Win32 Executable (generic) a (10002005/4) 49.96%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    File size:4'988'416 bytes
                    MD5:2d41e117f7b73d3b0b8804794b4fe9dd
                    SHA1:f0bd15035e0bf67f621c7e87c65b62c007e79fda
                    SHA256:5b88fdc4c1564305f8883e5ec48cadea105d082a5a1bae6a17c57c81c01069a7
                    SHA512:3932ba5248d7d6ca7f9164c9df9f7d8ef767dcc0bdd8ad753af61a90e4e9e4ab9ddee6aec4ea251f0b7e2c773814551dcd77e63edfbe29c3592f1ad5276722ed
                    SSDEEP:49152:JQhzPHd7fjm0s3CPRAYchlk7OFpur/q0HEiAEy0LssIeAyYyJ9ILvwUgPb2acdQa:6FHRSyPRA7swQ/jRHLAs0yHJ9ILqb
                    TLSH:0C36F6213DEF105D7362AAAD4FD8F8AFC95EF777264A21BA20710B474312D428D92739
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....(f..................$...........J.. ....%...@.. ........................q...........@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x8ad09c
                    Entrypoint Section:.OKDa
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66280887 [Tue Apr 23 19:14:15 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00652000h]
                    mov ax, ss
                    aad A6h
                    cwde
                    imul esi
                    mov edx, C566F3D5h
                    and edi, eax
                    sub ah, byte ptr [eax+69AE6704h]
                    mov al, 1Dh
                    or ebx, dword ptr [ebx]
                    mov cl, D2h
                    scasb
                    imul esi, dword ptr [eax-53E6C534h], B069AECCh
                    sbb al, byte ptr [edi-6Ch]
                    dec ebp
                    dec ebp
                    dec edi
                    sbb cl, byte ptr [ebx+0Ch]
                    std
                    loopne 00007FA8748E8516h
                    daa
                    push 41A64FDCh
                    test dword ptr [edx+4FDC68E1h], eax
                    dec dword ptr [ebp+ebp*4-60h]
                    xor eax, DC685033h
                    dec edi
                    mov bp, cs
                    push cs
                    and al, byte ptr [edi]
                    dec edi
                    sub ecx, dword ptr [eax]
                    xor eax, BA7386D5h
                    sbb dword ptr [esi], ecx
                    mov eax, E0091B79h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x4a3ae00x28.OKDa
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7160000x638.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7180000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2520000x8.Z%j5
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x4c57f00x48.OKDa
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x24d2740x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .{_x}0x2500000x6430x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .Z%j50x2520000x80x200890097eda9091e142fbb036c033a8ff4False0.03125data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .OKDa0x2540000x4c0cc40x4c0e0042dfe2d271cae593ea683f8a2fc8dbfbunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x7160000x6380x8009b6651015a439afb7c90a366e6b07c47False0.33935546875data3.4920647628337567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x7180000xc0x200f6b8c6f4ea6d86262b09cfbe8da4c289False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x7160a00x3a8data0.42094017094017094
                    RT_MANIFEST0x7164480x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Apr 24, 2024 03:30:54.727421999 CEST49675443192.168.2.523.1.237.91
                    Apr 24, 2024 03:30:54.727426052 CEST49674443192.168.2.523.1.237.91
                    Apr 24, 2024 03:30:54.821297884 CEST49673443192.168.2.523.1.237.91
                    Apr 24, 2024 03:31:04.336743116 CEST49674443192.168.2.523.1.237.91
                    Apr 24, 2024 03:31:04.336863041 CEST49675443192.168.2.523.1.237.91
                    Apr 24, 2024 03:31:04.430509090 CEST49673443192.168.2.523.1.237.91
                    Apr 24, 2024 03:31:05.852627039 CEST4434970323.1.237.91192.168.2.5
                    Apr 24, 2024 03:31:05.854435921 CEST49703443192.168.2.523.1.237.91
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Apr 24, 2024 03:31:15.698327065 CEST1.1.1.1192.168.2.50x6b85No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Apr 24, 2024 03:31:15.698327065 CEST1.1.1.1192.168.2.50x6b85No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Apr 24, 2024 03:31:15.888097048 CEST1.1.1.1192.168.2.50x914fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Apr 24, 2024 03:31:15.888097048 CEST1.1.1.1192.168.2.50x914fNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                    Apr 24, 2024 03:31:29.226206064 CEST1.1.1.1192.168.2.50x9bdaNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Apr 24, 2024 03:31:29.226206064 CEST1.1.1.1192.168.2.50x9bdaNo error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:03:30:56
                    Start date:24/04/2024
                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe"
                    Imagebase:0x430000
                    File size:4'988'416 bytes
                    MD5 hash:2D41E117F7B73D3B0B8804794B4FE9DD
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:03:30:56
                    Start date:24/04/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6d64d0000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:03:30:56
                    Start date:24/04/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Imagebase:0x510000
                    File size:262'432 bytes
                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000003.00000002.2018294948.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:moderate
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:20.2%
                      Dynamic/Decrypted Code Coverage:2.1%
                      Signature Coverage:6.3%
                      Total number of Nodes:1004
                      Total number of Limit Nodes:11
                      execution_graph 15984 2ef4ae8 15985 2ef4b2e LoadLibraryW 15984->15985 15987 2ef4b67 15985->15987 16836 6ce953fe 16837 6ce9540c 16836->16837 16838 6ce95407 16836->16838 16842 6ce952c8 16837->16842 16857 6ce95590 16838->16857 16843 6ce952d4 __FrameHandler3::FrameUnwindToState 16842->16843 16844 6ce952fd dllmain_raw 16843->16844 16845 6ce952f8 16843->16845 16846 6ce952e3 16843->16846 16844->16846 16847 6ce95317 dllmain_crt_dispatch 16844->16847 16861 6ce94810 16845->16861 16847->16845 16847->16846 16850 6ce95369 16850->16846 16851 6ce95372 dllmain_crt_dispatch 16850->16851 16851->16846 16853 6ce95385 dllmain_raw 16851->16853 16852 6ce94810 __DllMainCRTStartup@12 5 API calls 16854 6ce95350 16852->16854 16853->16846 16865 6ce95218 16854->16865 16856 6ce9535e dllmain_raw 16856->16850 16858 6ce955a6 16857->16858 16860 6ce955af 16858->16860 17044 6ce95543 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 16858->17044 16860->16837 16864 6ce94874 16861->16864 16862 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16863 6ce9504c 16862->16863 16863->16850 16863->16852 16864->16862 16866 6ce95224 __FrameHandler3::FrameUnwindToState __DllMainCRTStartup@12 16865->16866 16867 6ce952c0 16866->16867 16868 6ce95255 16866->16868 16883 6ce9522d 16866->16883 16913 6ce958fa IsProcessorFeaturePresent 16867->16913 16892 6ce9572b 16868->16892 16871 6ce9525a 16901 6ce955e7 16871->16901 16873 6ce952c7 __FrameHandler3::FrameUnwindToState 16875 6ce952fd dllmain_raw 16873->16875 16876 6ce952f8 16873->16876 16888 6ce952e3 16873->16888 16874 6ce9525f __RTC_Initialize __DllMainCRTStartup@12 16904 6ce958cc 16874->16904 16877 6ce95317 dllmain_crt_dispatch 16875->16877 16875->16888 16880 6ce94810 __DllMainCRTStartup@12 5 API calls 16876->16880 16877->16876 16877->16888 16882 6ce95338 16880->16882 16884 6ce95369 16882->16884 16886 6ce94810 __DllMainCRTStartup@12 5 API calls 16882->16886 16883->16856 16885 6ce95372 dllmain_crt_dispatch 16884->16885 16884->16888 16887 6ce95385 dllmain_raw 16885->16887 16885->16888 16889 6ce95350 16886->16889 16887->16888 16888->16856 16890 6ce95218 __DllMainCRTStartup@12 81 API calls 16889->16890 16891 6ce9535e dllmain_raw 16890->16891 16891->16884 16893 6ce95730 ___scrt_release_startup_lock 16892->16893 16894 6ce95734 16893->16894 16898 6ce95740 __DllMainCRTStartup@12 16893->16898 16895 6ce98bd2 __DllMainCRTStartup@12 14 API calls 16894->16895 16896 6ce9573e 16895->16896 16896->16871 16897 6ce9574d 16897->16871 16898->16897 16899 6ce983bb __FrameHandler3::FrameUnwindToState 21 API calls 16898->16899 16900 6ce9857a 16899->16900 16900->16871 16917 6ce9656a InterlockedFlushSList 16901->16917 16905 6ce958d8 16904->16905 16906 6ce9527e 16905->16906 16924 6ce98d7b 16905->16924 16910 6ce952ba 16906->16910 16908 6ce958e6 16929 6ce965bf 16908->16929 17027 6ce9574e 16910->17027 16914 6ce95910 __FrameHandler3::FrameUnwindToState 16913->16914 16915 6ce959bb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16914->16915 16916 6ce959ff __FrameHandler3::FrameUnwindToState 16915->16916 16916->16873 16918 6ce955f1 16917->16918 16919 6ce9657a 16917->16919 16918->16874 16919->16918 16921 6ce98df9 16919->16921 16922 6ce99be4 __freea 14 API calls 16921->16922 16923 6ce98e11 16922->16923 16923->16919 16925 6ce98d98 ___scrt_uninitialize_crt 16924->16925 16926 6ce98d86 16924->16926 16925->16908 16927 6ce98d94 16926->16927 16935 6ce9bfb5 16926->16935 16927->16908 16930 6ce965c8 16929->16930 16931 6ce965d2 16929->16931 17002 6ce96a41 16930->17002 16931->16906 16938 6ce9be46 16935->16938 16941 6ce9bd9a 16938->16941 16942 6ce9bda6 __FrameHandler3::FrameUnwindToState 16941->16942 16949 6ce997c3 EnterCriticalSection 16942->16949 16944 6ce9be1c 16958 6ce9be3a 16944->16958 16948 6ce9bdb0 ___scrt_uninitialize_crt 16948->16944 16950 6ce9bd0e 16948->16950 16949->16948 16951 6ce9bd1a __FrameHandler3::FrameUnwindToState 16950->16951 16961 6ce9c0d2 EnterCriticalSection 16951->16961 16953 6ce9bd24 ___scrt_uninitialize_crt 16957 6ce9bd5d 16953->16957 16962 6ce9bf50 16953->16962 16973 6ce9bd8e 16957->16973 17001 6ce9980b LeaveCriticalSection 16958->17001 16960 6ce9be28 16960->16927 16961->16953 16963 6ce9bf65 ___std_exception_copy 16962->16963 16964 6ce9bf6c 16963->16964 16965 6ce9bf77 16963->16965 16966 6ce9be46 ___scrt_uninitialize_crt 68 API calls 16964->16966 16976 6ce9bee7 16965->16976 16969 6ce9bf72 ___std_exception_copy 16966->16969 16969->16957 16971 6ce9bf98 16989 6ce9d5e5 16971->16989 17000 6ce9c0e6 LeaveCriticalSection 16973->17000 16975 6ce9bd7c 16975->16948 16977 6ce9bf00 16976->16977 16978 6ce9bf27 16976->16978 16977->16978 16979 6ce9c337 ___scrt_uninitialize_crt 29 API calls 16977->16979 16978->16969 16982 6ce9c337 16978->16982 16980 6ce9bf1c 16979->16980 16981 6ce9de04 ___scrt_uninitialize_crt 64 API calls 16980->16981 16981->16978 16983 6ce9c358 16982->16983 16984 6ce9c343 16982->16984 16983->16971 16985 6ce99b74 __dosmaperr 14 API calls 16984->16985 16986 6ce9c348 16985->16986 16987 6ce99a93 ___std_exception_copy 29 API calls 16986->16987 16988 6ce9c353 16987->16988 16988->16971 16990 6ce9d603 16989->16990 16991 6ce9d5f6 16989->16991 16992 6ce9d64c 16990->16992 16995 6ce9d62a 16990->16995 16993 6ce99b74 __dosmaperr 14 API calls 16991->16993 16994 6ce99b74 __dosmaperr 14 API calls 16992->16994 16999 6ce9d5fb 16993->16999 16996 6ce9d651 16994->16996 16997 6ce9d543 ___scrt_uninitialize_crt 33 API calls 16995->16997 16998 6ce99a93 ___std_exception_copy 29 API calls 16996->16998 16997->16999 16998->16999 16999->16969 17000->16975 17001->16960 17003 6ce965cd 17002->17003 17004 6ce96a4b 17002->17004 17006 6ce96a98 17003->17006 17010 6ce96fd8 17004->17010 17007 6ce96ac2 17006->17007 17008 6ce96aa3 17006->17008 17007->16931 17009 6ce96aad DeleteCriticalSection 17008->17009 17009->17007 17009->17009 17015 6ce96eb2 17010->17015 17013 6ce9700a TlsFree 17014 6ce96ffe 17013->17014 17014->17003 17016 6ce96ed3 17015->17016 17017 6ce96ecf 17015->17017 17016->17017 17018 6ce96f3b GetProcAddress 17016->17018 17020 6ce96f2c 17016->17020 17022 6ce96f52 LoadLibraryExW 17016->17022 17017->17013 17017->17014 17018->17017 17020->17018 17021 6ce96f34 FreeLibrary 17020->17021 17021->17018 17023 6ce96f69 GetLastError 17022->17023 17024 6ce96f99 17022->17024 17023->17024 17025 6ce96f74 ___vcrt_FlsGetValue 17023->17025 17024->17016 17025->17024 17026 6ce96f8a LoadLibraryExW 17025->17026 17026->17016 17032 6ce98dab 17027->17032 17030 6ce96a41 ___vcrt_uninitialize_ptd 6 API calls 17031 6ce952bf 17030->17031 17031->16883 17035 6ce99768 17032->17035 17036 6ce99772 17035->17036 17038 6ce95755 17035->17038 17039 6ce9b488 17036->17039 17038->17030 17040 6ce9b365 _unexpected 5 API calls 17039->17040 17041 6ce9b4a4 17040->17041 17042 6ce9b4ad 17041->17042 17043 6ce9b4bf TlsFree 17041->17043 17042->17038 17044->16860 17045 6ce950be 17046 6ce950c9 17045->17046 17047 6ce950fc 17045->17047 17049 6ce950ee 17046->17049 17050 6ce950ce 17046->17050 17048 6ce95218 __DllMainCRTStartup@12 86 API calls 17047->17048 17056 6ce950d8 17048->17056 17057 6ce95111 17049->17057 17052 6ce950d3 17050->17052 17053 6ce950e4 17050->17053 17052->17056 17071 6ce956ea 17052->17071 17076 6ce956cb 17053->17076 17058 6ce9511d __FrameHandler3::FrameUnwindToState 17057->17058 17084 6ce9575b 17058->17084 17060 6ce95124 __DllMainCRTStartup@12 17061 6ce9514b 17060->17061 17062 6ce95210 17060->17062 17068 6ce95187 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 17060->17068 17095 6ce956bd 17061->17095 17063 6ce958fa __DllMainCRTStartup@12 4 API calls 17062->17063 17065 6ce95217 17063->17065 17066 6ce9515a __RTC_Initialize 17066->17068 17098 6ce955db InitializeSListHead 17066->17098 17068->17056 17069 6ce95168 17069->17068 17099 6ce95692 17069->17099 17160 6ce98d73 17071->17160 17249 6ce965ac 17076->17249 17081 6ce956e7 17081->17056 17082 6ce965b7 21 API calls 17083 6ce956d4 17082->17083 17083->17056 17085 6ce95764 17084->17085 17103 6ce95ab8 IsProcessorFeaturePresent 17085->17103 17089 6ce95775 17094 6ce95779 17089->17094 17113 6ce98d56 17089->17113 17092 6ce95790 17092->17060 17093 6ce965bf ___scrt_uninitialize_crt 7 API calls 17093->17094 17094->17060 17154 6ce95794 17095->17154 17097 6ce956c4 17097->17066 17098->17069 17100 6ce95697 ___scrt_release_startup_lock 17099->17100 17101 6ce95ab8 IsProcessorFeaturePresent 17100->17101 17102 6ce956a0 17100->17102 17101->17102 17102->17068 17104 6ce95770 17103->17104 17105 6ce9658d 17104->17105 17116 6ce96a5c 17105->17116 17108 6ce96596 17108->17089 17110 6ce9659e 17111 6ce965a9 17110->17111 17112 6ce96a98 ___vcrt_uninitialize_locks DeleteCriticalSection 17110->17112 17111->17089 17112->17108 17145 6ce9b878 17113->17145 17117 6ce96a65 17116->17117 17119 6ce96a8e 17117->17119 17121 6ce96592 17117->17121 17130 6ce9708c 17117->17130 17120 6ce96a98 ___vcrt_uninitialize_locks DeleteCriticalSection 17119->17120 17120->17121 17121->17108 17122 6ce96a0e 17121->17122 17135 6ce96f9d 17122->17135 17125 6ce96a23 17125->17110 17128 6ce96a3e 17128->17110 17129 6ce96a41 ___vcrt_uninitialize_ptd 6 API calls 17129->17125 17131 6ce96eb2 ___vcrt_FlsGetValue 5 API calls 17130->17131 17132 6ce970a6 17131->17132 17133 6ce970af 17132->17133 17134 6ce970c4 InitializeCriticalSectionAndSpinCount 17132->17134 17133->17117 17134->17133 17136 6ce96eb2 ___vcrt_FlsGetValue 5 API calls 17135->17136 17137 6ce96fb7 17136->17137 17138 6ce96fd0 TlsAlloc 17137->17138 17139 6ce96a18 17137->17139 17139->17125 17140 6ce9704e 17139->17140 17141 6ce96eb2 ___vcrt_FlsGetValue 5 API calls 17140->17141 17142 6ce97068 17141->17142 17143 6ce97083 TlsSetValue 17142->17143 17144 6ce96a31 17142->17144 17143->17144 17144->17128 17144->17129 17146 6ce9b888 17145->17146 17147 6ce95782 17145->17147 17146->17147 17149 6ce9b73c 17146->17149 17147->17092 17147->17093 17150 6ce9b743 17149->17150 17151 6ce9b786 GetStdHandle 17150->17151 17152 6ce9b7e8 17150->17152 17153 6ce9b799 GetFileType 17150->17153 17151->17150 17152->17146 17153->17150 17155 6ce957a0 17154->17155 17156 6ce957a4 17154->17156 17155->17097 17157 6ce957b1 ___scrt_release_startup_lock 17156->17157 17158 6ce958fa __DllMainCRTStartup@12 4 API calls 17156->17158 17157->17097 17159 6ce9581a 17158->17159 17166 6ce9946b 17160->17166 17163 6ce965b7 17232 6ce96943 17163->17232 17167 6ce99475 17166->17167 17168 6ce956ef 17166->17168 17169 6ce9b4c7 _unexpected 6 API calls 17167->17169 17168->17163 17170 6ce9947c 17169->17170 17170->17168 17171 6ce9b506 _unexpected 6 API calls 17170->17171 17172 6ce9948f 17171->17172 17174 6ce99332 17172->17174 17175 6ce9933d 17174->17175 17176 6ce9934d 17174->17176 17180 6ce99353 17175->17180 17176->17168 17179 6ce99be4 __freea 14 API calls 17179->17176 17181 6ce99368 17180->17181 17182 6ce9936e 17180->17182 17184 6ce99be4 __freea 14 API calls 17181->17184 17183 6ce99be4 __freea 14 API calls 17182->17183 17185 6ce9937a 17183->17185 17184->17182 17186 6ce99be4 __freea 14 API calls 17185->17186 17187 6ce99385 17186->17187 17188 6ce99be4 __freea 14 API calls 17187->17188 17189 6ce99390 17188->17189 17190 6ce99be4 __freea 14 API calls 17189->17190 17191 6ce9939b 17190->17191 17192 6ce99be4 __freea 14 API calls 17191->17192 17193 6ce993a6 17192->17193 17194 6ce99be4 __freea 14 API calls 17193->17194 17195 6ce993b1 17194->17195 17196 6ce99be4 __freea 14 API calls 17195->17196 17197 6ce993bc 17196->17197 17198 6ce99be4 __freea 14 API calls 17197->17198 17199 6ce993c7 17198->17199 17200 6ce99be4 __freea 14 API calls 17199->17200 17201 6ce993d5 17200->17201 17206 6ce9917f 17201->17206 17207 6ce9918b __FrameHandler3::FrameUnwindToState 17206->17207 17222 6ce997c3 EnterCriticalSection 17207->17222 17209 6ce991bf 17223 6ce991de 17209->17223 17211 6ce99195 17211->17209 17213 6ce99be4 __freea 14 API calls 17211->17213 17213->17209 17214 6ce991ea 17215 6ce991f6 __FrameHandler3::FrameUnwindToState 17214->17215 17227 6ce997c3 EnterCriticalSection 17215->17227 17217 6ce99200 17218 6ce99420 _unexpected 14 API calls 17217->17218 17219 6ce99213 17218->17219 17228 6ce99233 17219->17228 17222->17211 17226 6ce9980b LeaveCriticalSection 17223->17226 17225 6ce991cc 17225->17214 17226->17225 17227->17217 17231 6ce9980b LeaveCriticalSection 17228->17231 17230 6ce99221 17230->17179 17231->17230 17233 6ce9694d 17232->17233 17239 6ce956f4 17232->17239 17240 6ce97013 17233->17240 17236 6ce9704e ___vcrt_FlsSetValue 6 API calls 17237 6ce96963 17236->17237 17245 6ce96927 17237->17245 17239->17056 17241 6ce96eb2 ___vcrt_FlsGetValue 5 API calls 17240->17241 17242 6ce9702d 17241->17242 17243 6ce97045 TlsGetValue 17242->17243 17244 6ce96954 17242->17244 17243->17244 17244->17236 17246 6ce9693e 17245->17246 17247 6ce96931 17245->17247 17246->17239 17247->17246 17248 6ce98df9 ___std_exception_copy 14 API calls 17247->17248 17248->17246 17255 6ce9697c 17249->17255 17251 6ce956d0 17251->17083 17252 6ce98d68 17251->17252 17253 6ce995e8 __dosmaperr 14 API calls 17252->17253 17254 6ce956dc 17253->17254 17254->17081 17254->17082 17256 6ce96988 GetLastError 17255->17256 17257 6ce96985 17255->17257 17258 6ce97013 ___vcrt_FlsGetValue 6 API calls 17256->17258 17257->17251 17259 6ce9699d 17258->17259 17260 6ce96a02 SetLastError 17259->17260 17261 6ce9704e ___vcrt_FlsSetValue 6 API calls 17259->17261 17268 6ce969bc 17259->17268 17260->17251 17262 6ce969b6 __FrameHandler3::FrameUnwindToState 17261->17262 17263 6ce969de 17262->17263 17264 6ce9704e ___vcrt_FlsSetValue 6 API calls 17262->17264 17262->17268 17265 6ce9704e ___vcrt_FlsSetValue 6 API calls 17263->17265 17266 6ce969f2 17263->17266 17264->17263 17265->17266 17267 6ce98df9 ___std_exception_copy 14 API calls 17266->17267 17267->17268 17268->17260 15988 6ce988a7 16003 6ce9abe8 15988->16003 15993 6ce988cf 16037 6ce98900 15993->16037 15994 6ce988c3 16031 6ce99be4 15994->16031 15999 6ce99be4 __freea 14 API calls 16000 6ce988f3 15999->16000 16001 6ce99be4 __freea 14 API calls 16000->16001 16002 6ce988f9 16001->16002 16004 6ce988b8 16003->16004 16005 6ce9abf1 16003->16005 16009 6ce9b13f GetEnvironmentStringsW 16004->16009 16059 6ce99552 16005->16059 16010 6ce9b157 16009->16010 16015 6ce988bd 16009->16015 16011 6ce9b09c ___scrt_uninitialize_crt WideCharToMultiByte 16010->16011 16012 6ce9b174 16011->16012 16013 6ce9b189 16012->16013 16014 6ce9b17e FreeEnvironmentStringsW 16012->16014 16016 6ce9c0fa 15 API calls 16013->16016 16014->16015 16015->15993 16015->15994 16017 6ce9b190 16016->16017 16018 6ce9b1a9 16017->16018 16019 6ce9b198 16017->16019 16021 6ce9b09c ___scrt_uninitialize_crt WideCharToMultiByte 16018->16021 16020 6ce99be4 __freea 14 API calls 16019->16020 16022 6ce9b19d FreeEnvironmentStringsW 16020->16022 16023 6ce9b1b9 16021->16023 16024 6ce9b1da 16022->16024 16025 6ce9b1c8 16023->16025 16026 6ce9b1c0 16023->16026 16024->16015 16028 6ce99be4 __freea 14 API calls 16025->16028 16027 6ce99be4 __freea 14 API calls 16026->16027 16029 6ce9b1c6 FreeEnvironmentStringsW 16027->16029 16028->16029 16029->16024 16032 6ce988c9 16031->16032 16033 6ce99bef HeapFree 16031->16033 16033->16032 16034 6ce99c04 GetLastError 16033->16034 16035 6ce99c11 __dosmaperr 16034->16035 16036 6ce99b74 __dosmaperr 12 API calls 16035->16036 16036->16032 16038 6ce98915 16037->16038 16039 6ce99b87 _unexpected 14 API calls 16038->16039 16040 6ce9893c 16039->16040 16041 6ce98944 16040->16041 16050 6ce9894e 16040->16050 16042 6ce99be4 __freea 14 API calls 16041->16042 16058 6ce988d6 16042->16058 16043 6ce989ab 16044 6ce99be4 __freea 14 API calls 16043->16044 16044->16058 16045 6ce99b87 _unexpected 14 API calls 16045->16050 16046 6ce989ba 16764 6ce989e2 16046->16764 16050->16043 16050->16045 16050->16046 16051 6ce989d5 16050->16051 16053 6ce99be4 __freea 14 API calls 16050->16053 16755 6ce98e1f 16050->16755 16054 6ce99aa3 ___std_exception_copy 11 API calls 16051->16054 16052 6ce99be4 __freea 14 API calls 16055 6ce989c7 16052->16055 16053->16050 16056 6ce989e1 16054->16056 16057 6ce99be4 __freea 14 API calls 16055->16057 16057->16058 16058->15999 16060 6ce9955d 16059->16060 16061 6ce99563 16059->16061 16107 6ce9b4c7 16060->16107 16065 6ce99569 16061->16065 16112 6ce9b506 16061->16112 16083 6ce9956e 16065->16083 16129 6ce98e79 16065->16129 16070 6ce995aa 16072 6ce9b506 _unexpected 6 API calls 16070->16072 16071 6ce99595 16073 6ce9b506 _unexpected 6 API calls 16071->16073 16074 6ce995b6 16072->16074 16080 6ce995a1 16073->16080 16075 6ce995c9 16074->16075 16076 6ce995ba 16074->16076 16124 6ce99299 16075->16124 16078 6ce9b506 _unexpected 6 API calls 16076->16078 16077 6ce99be4 __freea 14 API calls 16077->16065 16078->16080 16080->16077 16082 6ce99be4 __freea 14 API calls 16082->16083 16084 6ce9a9f3 16083->16084 16551 6ce9ab48 16084->16551 16091 6ce9aa5d 16576 6ce9ac43 16091->16576 16092 6ce9aa4f 16093 6ce99be4 __freea 14 API calls 16092->16093 16095 6ce9aa36 16093->16095 16095->16004 16097 6ce9aa95 16098 6ce99b74 __dosmaperr 14 API calls 16097->16098 16100 6ce9aa9a 16098->16100 16099 6ce9aadc 16103 6ce9ab25 16099->16103 16587 6ce9a66c 16099->16587 16101 6ce99be4 __freea 14 API calls 16100->16101 16101->16095 16102 6ce9aab0 16102->16099 16105 6ce99be4 __freea 14 API calls 16102->16105 16104 6ce99be4 __freea 14 API calls 16103->16104 16104->16095 16105->16099 16140 6ce9b365 16107->16140 16109 6ce9b4e3 16110 6ce9b4ec 16109->16110 16111 6ce9b4fe TlsGetValue 16109->16111 16110->16061 16113 6ce9b365 _unexpected 5 API calls 16112->16113 16114 6ce9b522 16113->16114 16115 6ce9957d 16114->16115 16116 6ce9b540 TlsSetValue 16114->16116 16115->16065 16117 6ce99b87 16115->16117 16122 6ce99b94 _unexpected 16117->16122 16118 6ce99bd4 16157 6ce99b74 16118->16157 16119 6ce99bbf HeapAlloc 16120 6ce9958d 16119->16120 16119->16122 16120->16070 16120->16071 16122->16118 16122->16119 16154 6ce9b920 16122->16154 16194 6ce9912d 16124->16194 16336 6ce9ba75 16129->16336 16132 6ce98e89 16134 6ce98e93 IsProcessorFeaturePresent 16132->16134 16135 6ce98eb2 16132->16135 16136 6ce98e9f 16134->16136 16372 6ce9857e 16135->16372 16366 6ce99897 16136->16366 16141 6ce9b395 16140->16141 16145 6ce9b391 _unexpected 16140->16145 16141->16145 16146 6ce9b29a 16141->16146 16144 6ce9b3af GetProcAddress 16144->16145 16145->16109 16152 6ce9b2ab ___vcrt_FlsGetValue 16146->16152 16147 6ce9b341 16147->16144 16147->16145 16148 6ce9b2c9 LoadLibraryExW 16149 6ce9b348 16148->16149 16150 6ce9b2e4 GetLastError 16148->16150 16149->16147 16151 6ce9b35a FreeLibrary 16149->16151 16150->16152 16151->16147 16152->16147 16152->16148 16153 6ce9b317 LoadLibraryExW 16152->16153 16153->16149 16153->16152 16160 6ce9b94c 16154->16160 16171 6ce995e8 GetLastError 16157->16171 16159 6ce99b79 16159->16120 16161 6ce9b958 __FrameHandler3::FrameUnwindToState 16160->16161 16166 6ce997c3 EnterCriticalSection 16161->16166 16163 6ce9b963 __FrameHandler3::FrameUnwindToState 16167 6ce9b99a 16163->16167 16166->16163 16170 6ce9980b LeaveCriticalSection 16167->16170 16169 6ce9b92b 16169->16122 16170->16169 16172 6ce99604 16171->16172 16173 6ce995fe 16171->16173 16175 6ce9b506 _unexpected 6 API calls 16172->16175 16191 6ce99608 SetLastError 16172->16191 16174 6ce9b4c7 _unexpected 6 API calls 16173->16174 16174->16172 16176 6ce99620 16175->16176 16178 6ce99b87 _unexpected 12 API calls 16176->16178 16176->16191 16179 6ce99635 16178->16179 16180 6ce9963d 16179->16180 16181 6ce9964e 16179->16181 16182 6ce9b506 _unexpected 6 API calls 16180->16182 16183 6ce9b506 _unexpected 6 API calls 16181->16183 16184 6ce9964b 16182->16184 16185 6ce9965a 16183->16185 16189 6ce99be4 __freea 12 API calls 16184->16189 16186 6ce9965e 16185->16186 16187 6ce99675 16185->16187 16188 6ce9b506 _unexpected 6 API calls 16186->16188 16190 6ce99299 _unexpected 12 API calls 16187->16190 16188->16184 16189->16191 16192 6ce99680 16190->16192 16191->16159 16193 6ce99be4 __freea 12 API calls 16192->16193 16193->16191 16195 6ce99139 __FrameHandler3::FrameUnwindToState 16194->16195 16208 6ce997c3 EnterCriticalSection 16195->16208 16197 6ce99143 16209 6ce99173 16197->16209 16200 6ce9923f 16201 6ce9924b __FrameHandler3::FrameUnwindToState 16200->16201 16213 6ce997c3 EnterCriticalSection 16201->16213 16203 6ce99255 16214 6ce99420 16203->16214 16205 6ce9926d 16218 6ce9928d 16205->16218 16208->16197 16212 6ce9980b LeaveCriticalSection 16209->16212 16211 6ce99161 16211->16200 16212->16211 16213->16203 16215 6ce99456 _unexpected 16214->16215 16216 6ce9942f _unexpected 16214->16216 16215->16205 16216->16215 16221 6ce9c47b 16216->16221 16335 6ce9980b LeaveCriticalSection 16218->16335 16220 6ce9927b 16220->16082 16222 6ce9c4fb 16221->16222 16225 6ce9c491 16221->16225 16224 6ce99be4 __freea 14 API calls 16222->16224 16247 6ce9c549 16222->16247 16226 6ce9c51d 16224->16226 16225->16222 16229 6ce99be4 __freea 14 API calls 16225->16229 16231 6ce9c4c4 16225->16231 16227 6ce99be4 __freea 14 API calls 16226->16227 16230 6ce9c530 16227->16230 16228 6ce9c557 16233 6ce9c5b7 16228->16233 16246 6ce99be4 14 API calls __freea 16228->16246 16234 6ce9c4b9 16229->16234 16235 6ce99be4 __freea 14 API calls 16230->16235 16236 6ce99be4 __freea 14 API calls 16231->16236 16248 6ce9c4e6 16231->16248 16232 6ce99be4 __freea 14 API calls 16237 6ce9c4f0 16232->16237 16238 6ce99be4 __freea 14 API calls 16233->16238 16249 6ce9e3f6 16234->16249 16240 6ce9c53e 16235->16240 16241 6ce9c4db 16236->16241 16242 6ce99be4 __freea 14 API calls 16237->16242 16243 6ce9c5bd 16238->16243 16244 6ce99be4 __freea 14 API calls 16240->16244 16277 6ce9e4f4 16241->16277 16242->16222 16243->16215 16244->16247 16246->16228 16289 6ce9c5ec 16247->16289 16248->16232 16250 6ce9e407 16249->16250 16276 6ce9e4f0 16249->16276 16251 6ce9e418 16250->16251 16252 6ce99be4 __freea 14 API calls 16250->16252 16253 6ce9e42a 16251->16253 16254 6ce99be4 __freea 14 API calls 16251->16254 16252->16251 16255 6ce9e43c 16253->16255 16256 6ce99be4 __freea 14 API calls 16253->16256 16254->16253 16257 6ce9e44e 16255->16257 16258 6ce99be4 __freea 14 API calls 16255->16258 16256->16255 16259 6ce9e460 16257->16259 16260 6ce99be4 __freea 14 API calls 16257->16260 16258->16257 16261 6ce9e472 16259->16261 16262 6ce99be4 __freea 14 API calls 16259->16262 16260->16259 16263 6ce9e484 16261->16263 16264 6ce99be4 __freea 14 API calls 16261->16264 16262->16261 16265 6ce9e496 16263->16265 16266 6ce99be4 __freea 14 API calls 16263->16266 16264->16263 16267 6ce9e4a8 16265->16267 16268 6ce99be4 __freea 14 API calls 16265->16268 16266->16265 16269 6ce99be4 __freea 14 API calls 16267->16269 16270 6ce9e4ba 16267->16270 16268->16267 16269->16270 16271 6ce99be4 __freea 14 API calls 16270->16271 16272 6ce9e4cc 16270->16272 16271->16272 16273 6ce9e4de 16272->16273 16274 6ce99be4 __freea 14 API calls 16272->16274 16275 6ce99be4 __freea 14 API calls 16273->16275 16273->16276 16274->16273 16275->16276 16276->16231 16278 6ce9e559 16277->16278 16279 6ce9e501 16277->16279 16278->16248 16280 6ce9e511 16279->16280 16281 6ce99be4 __freea 14 API calls 16279->16281 16282 6ce9e523 16280->16282 16283 6ce99be4 __freea 14 API calls 16280->16283 16281->16280 16284 6ce9e535 16282->16284 16285 6ce99be4 __freea 14 API calls 16282->16285 16283->16282 16286 6ce9e547 16284->16286 16287 6ce99be4 __freea 14 API calls 16284->16287 16285->16284 16286->16278 16288 6ce99be4 __freea 14 API calls 16286->16288 16287->16286 16288->16278 16290 6ce9c5f9 16289->16290 16291 6ce9c618 16289->16291 16290->16291 16295 6ce9e582 16290->16295 16291->16228 16294 6ce99be4 __freea 14 API calls 16294->16291 16296 6ce9c612 16295->16296 16297 6ce9e593 16295->16297 16296->16294 16331 6ce9e55d 16297->16331 16300 6ce9e55d _unexpected 14 API calls 16301 6ce9e5a6 16300->16301 16302 6ce9e55d _unexpected 14 API calls 16301->16302 16303 6ce9e5b1 16302->16303 16304 6ce9e55d _unexpected 14 API calls 16303->16304 16305 6ce9e5bc 16304->16305 16306 6ce9e55d _unexpected 14 API calls 16305->16306 16307 6ce9e5ca 16306->16307 16308 6ce99be4 __freea 14 API calls 16307->16308 16309 6ce9e5d5 16308->16309 16310 6ce99be4 __freea 14 API calls 16309->16310 16311 6ce9e5e0 16310->16311 16312 6ce99be4 __freea 14 API calls 16311->16312 16313 6ce9e5eb 16312->16313 16314 6ce9e55d _unexpected 14 API calls 16313->16314 16315 6ce9e5f9 16314->16315 16316 6ce9e55d _unexpected 14 API calls 16315->16316 16317 6ce9e607 16316->16317 16318 6ce9e55d _unexpected 14 API calls 16317->16318 16319 6ce9e618 16318->16319 16320 6ce9e55d _unexpected 14 API calls 16319->16320 16321 6ce9e626 16320->16321 16322 6ce9e55d _unexpected 14 API calls 16321->16322 16323 6ce9e634 16322->16323 16324 6ce99be4 __freea 14 API calls 16323->16324 16325 6ce9e63f 16324->16325 16326 6ce99be4 __freea 14 API calls 16325->16326 16327 6ce9e64a 16326->16327 16328 6ce99be4 __freea 14 API calls 16327->16328 16329 6ce9e655 16328->16329 16330 6ce99be4 __freea 14 API calls 16329->16330 16330->16296 16332 6ce9e56f 16331->16332 16333 6ce9e57e 16332->16333 16334 6ce99be4 __freea 14 API calls 16332->16334 16333->16300 16334->16332 16335->16220 16375 6ce9b9a3 16336->16375 16339 6ce9baba 16345 6ce9bac6 __FrameHandler3::FrameUnwindToState 16339->16345 16340 6ce995e8 __dosmaperr 14 API calls 16349 6ce9baf7 __FrameHandler3::FrameUnwindToState 16340->16349 16341 6ce9bb16 16344 6ce99b74 __dosmaperr 14 API calls 16341->16344 16342 6ce9bb00 16342->16132 16343 6ce9bb28 __FrameHandler3::FrameUnwindToState 16346 6ce9bb5e __FrameHandler3::FrameUnwindToState 16343->16346 16389 6ce997c3 EnterCriticalSection 16343->16389 16347 6ce9bb1b 16344->16347 16345->16340 16345->16341 16345->16343 16345->16349 16352 6ce9bc98 16346->16352 16353 6ce9bb9b 16346->16353 16363 6ce9bbc9 16346->16363 16386 6ce99a93 16347->16386 16349->16341 16349->16342 16349->16343 16354 6ce9bca3 16352->16354 16421 6ce9980b LeaveCriticalSection 16352->16421 16353->16363 16390 6ce99497 GetLastError 16353->16390 16357 6ce9857e __FrameHandler3::FrameUnwindToState 21 API calls 16354->16357 16359 6ce9bcab 16357->16359 16360 6ce99497 _unexpected 39 API calls 16364 6ce9bc1e 16360->16364 16362 6ce99497 _unexpected 39 API calls 16362->16363 16417 6ce9bc44 16363->16417 16364->16342 16365 6ce99497 _unexpected 39 API calls 16364->16365 16365->16342 16367 6ce998b3 __FrameHandler3::FrameUnwindToState 16366->16367 16368 6ce998df IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16367->16368 16371 6ce999b0 __FrameHandler3::FrameUnwindToState 16368->16371 16370 6ce999ce 16370->16135 16471 6ce950b0 16371->16471 16479 6ce983bb 16372->16479 16376 6ce9b9af __FrameHandler3::FrameUnwindToState 16375->16376 16381 6ce997c3 EnterCriticalSection 16376->16381 16378 6ce9b9bd 16382 6ce9b9ff 16378->16382 16381->16378 16385 6ce9980b LeaveCriticalSection 16382->16385 16384 6ce98e7e 16384->16132 16384->16339 16385->16384 16422 6ce999df 16386->16422 16388 6ce99a9f 16388->16342 16389->16346 16391 6ce994ad 16390->16391 16392 6ce994b3 16390->16392 16394 6ce9b4c7 _unexpected 6 API calls 16391->16394 16393 6ce9b506 _unexpected 6 API calls 16392->16393 16396 6ce994b7 SetLastError 16392->16396 16395 6ce994cf 16393->16395 16394->16392 16395->16396 16398 6ce99b87 _unexpected 14 API calls 16395->16398 16400 6ce9954c 16396->16400 16401 6ce99547 16396->16401 16399 6ce994e4 16398->16399 16402 6ce994fd 16399->16402 16403 6ce994ec 16399->16403 16404 6ce98e79 __FrameHandler3::FrameUnwindToState 37 API calls 16400->16404 16401->16362 16406 6ce9b506 _unexpected 6 API calls 16402->16406 16405 6ce9b506 _unexpected 6 API calls 16403->16405 16407 6ce99551 16404->16407 16414 6ce994fa 16405->16414 16408 6ce99509 16406->16408 16409 6ce9950d 16408->16409 16410 6ce99524 16408->16410 16413 6ce9b506 _unexpected 6 API calls 16409->16413 16412 6ce99299 _unexpected 14 API calls 16410->16412 16411 6ce99be4 __freea 14 API calls 16411->16396 16415 6ce9952f 16412->16415 16413->16414 16414->16411 16416 6ce99be4 __freea 14 API calls 16415->16416 16416->16396 16418 6ce9bc48 16417->16418 16420 6ce9bc10 16417->16420 16470 6ce9980b LeaveCriticalSection 16418->16470 16420->16342 16420->16360 16420->16364 16421->16354 16423 6ce999f1 ___std_exception_copy 16422->16423 16426 6ce99a16 16423->16426 16425 6ce99a09 ___std_exception_copy 16425->16388 16427 6ce99a2d 16426->16427 16428 6ce99a26 16426->16428 16433 6ce99a3b 16427->16433 16441 6ce9986e 16427->16441 16437 6ce98f60 GetLastError 16428->16437 16431 6ce99a62 16431->16433 16444 6ce99aa3 IsProcessorFeaturePresent 16431->16444 16433->16425 16434 6ce99a92 16435 6ce999df ___std_exception_copy 29 API calls 16434->16435 16436 6ce99a9f 16435->16436 16436->16425 16438 6ce98f79 16437->16438 16448 6ce99699 16438->16448 16442 6ce99879 GetLastError SetLastError 16441->16442 16443 6ce99892 16441->16443 16442->16431 16443->16431 16445 6ce99aaf 16444->16445 16446 6ce99897 __FrameHandler3::FrameUnwindToState 8 API calls 16445->16446 16447 6ce99ac4 GetCurrentProcess TerminateProcess 16446->16447 16447->16434 16449 6ce996ac 16448->16449 16450 6ce996b2 16448->16450 16451 6ce9b4c7 _unexpected 6 API calls 16449->16451 16452 6ce9b506 _unexpected 6 API calls 16450->16452 16469 6ce98f95 SetLastError 16450->16469 16451->16450 16453 6ce996cc 16452->16453 16454 6ce99b87 _unexpected 14 API calls 16453->16454 16453->16469 16455 6ce996dc 16454->16455 16456 6ce996f9 16455->16456 16457 6ce996e4 16455->16457 16459 6ce9b506 _unexpected 6 API calls 16456->16459 16458 6ce9b506 _unexpected 6 API calls 16457->16458 16467 6ce996f0 16458->16467 16460 6ce99705 16459->16460 16461 6ce99709 16460->16461 16462 6ce99718 16460->16462 16464 6ce9b506 _unexpected 6 API calls 16461->16464 16465 6ce99299 _unexpected 14 API calls 16462->16465 16463 6ce99be4 __freea 14 API calls 16463->16469 16464->16467 16466 6ce99723 16465->16466 16468 6ce99be4 __freea 14 API calls 16466->16468 16467->16463 16468->16469 16469->16427 16470->16420 16472 6ce950b9 IsProcessorFeaturePresent 16471->16472 16473 6ce950b8 16471->16473 16475 6ce9545e 16472->16475 16473->16370 16478 6ce95421 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16475->16478 16477 6ce95541 16477->16370 16478->16477 16480 6ce983e8 16479->16480 16481 6ce983f9 16479->16481 16490 6ce98483 GetModuleHandleW 16480->16490 16497 6ce9826b 16481->16497 16486 6ce98437 16491 6ce983ed 16490->16491 16491->16481 16492 6ce984de GetModuleHandleExW 16491->16492 16493 6ce9851d GetProcAddress 16492->16493 16494 6ce98531 16492->16494 16493->16494 16495 6ce9854d 16494->16495 16496 6ce98544 FreeLibrary 16494->16496 16495->16481 16496->16495 16498 6ce98277 __FrameHandler3::FrameUnwindToState 16497->16498 16512 6ce997c3 EnterCriticalSection 16498->16512 16500 6ce98281 16513 6ce982d3 16500->16513 16502 6ce9828e 16517 6ce982ac 16502->16517 16505 6ce98452 16541 6ce984c5 16505->16541 16507 6ce9845c 16508 6ce98470 16507->16508 16509 6ce98460 GetCurrentProcess TerminateProcess 16507->16509 16510 6ce984de __FrameHandler3::FrameUnwindToState 3 API calls 16508->16510 16509->16508 16511 6ce98478 ExitProcess 16510->16511 16512->16500 16514 6ce982df __FrameHandler3::FrameUnwindToState 16513->16514 16515 6ce98343 __FrameHandler3::FrameUnwindToState 16514->16515 16520 6ce98bd2 16514->16520 16515->16502 16540 6ce9980b LeaveCriticalSection 16517->16540 16519 6ce9829a 16519->16486 16519->16505 16521 6ce98bde __EH_prolog3 16520->16521 16524 6ce98a9d 16521->16524 16523 6ce98c05 __DllMainCRTStartup@12 16523->16515 16525 6ce98aa9 __FrameHandler3::FrameUnwindToState 16524->16525 16532 6ce997c3 EnterCriticalSection 16525->16532 16527 6ce98ab7 16533 6ce98af8 16527->16533 16532->16527 16534 6ce98b17 16533->16534 16535 6ce98ac4 16533->16535 16534->16535 16536 6ce99be4 __freea 14 API calls 16534->16536 16537 6ce98aec 16535->16537 16536->16535 16538 6ce9980b __FrameHandler3::FrameUnwindToState LeaveCriticalSection 16537->16538 16539 6ce98ad5 16538->16539 16539->16523 16540->16519 16544 6ce99847 16541->16544 16543 6ce984ca __FrameHandler3::FrameUnwindToState 16543->16507 16545 6ce99856 __FrameHandler3::FrameUnwindToState 16544->16545 16546 6ce99863 16545->16546 16548 6ce9b3ea 16545->16548 16546->16543 16549 6ce9b365 _unexpected 5 API calls 16548->16549 16550 6ce9b406 16549->16550 16550->16546 16552 6ce9ab54 __FrameHandler3::FrameUnwindToState 16551->16552 16553 6ce9ab6e 16552->16553 16595 6ce997c3 EnterCriticalSection 16552->16595 16555 6ce9aa1d 16553->16555 16558 6ce98e79 __FrameHandler3::FrameUnwindToState 39 API calls 16553->16558 16562 6ce9a77a 16555->16562 16556 6ce9abaa 16596 6ce9abc7 16556->16596 16559 6ce9abe7 16558->16559 16560 6ce9ab7e 16560->16556 16561 6ce99be4 __freea 14 API calls 16560->16561 16561->16556 16600 6ce9a27e 16562->16600 16565 6ce9a79b GetOEMCP 16567 6ce9a7c4 16565->16567 16566 6ce9a7ad 16566->16567 16568 6ce9a7b2 GetACP 16566->16568 16567->16095 16569 6ce9c0fa 16567->16569 16568->16567 16570 6ce9c138 16569->16570 16574 6ce9c108 _unexpected 16569->16574 16572 6ce99b74 __dosmaperr 14 API calls 16570->16572 16571 6ce9c123 HeapAlloc 16573 6ce9aa47 16571->16573 16571->16574 16572->16573 16573->16091 16573->16092 16574->16570 16574->16571 16575 6ce9b920 _unexpected 2 API calls 16574->16575 16575->16574 16577 6ce9a77a 41 API calls 16576->16577 16578 6ce9ac63 16577->16578 16579 6ce9ad68 16578->16579 16581 6ce9aca0 IsValidCodePage 16578->16581 16585 6ce9acbb __FrameHandler3::FrameUnwindToState 16578->16585 16580 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16579->16580 16583 6ce9aa8a 16580->16583 16581->16579 16582 6ce9acb2 16581->16582 16584 6ce9acdb GetCPInfo 16582->16584 16582->16585 16583->16097 16583->16102 16584->16579 16584->16585 16643 6ce9a84e 16585->16643 16588 6ce9a678 __FrameHandler3::FrameUnwindToState 16587->16588 16729 6ce997c3 EnterCriticalSection 16588->16729 16590 6ce9a682 16730 6ce9a6b9 16590->16730 16595->16560 16599 6ce9980b LeaveCriticalSection 16596->16599 16598 6ce9abce 16598->16553 16599->16598 16601 6ce9a29c 16600->16601 16602 6ce9a295 16600->16602 16601->16602 16603 6ce99497 _unexpected 39 API calls 16601->16603 16602->16565 16602->16566 16604 6ce9a2bd 16603->16604 16608 6ce9c148 16604->16608 16609 6ce9c15b 16608->16609 16611 6ce9a2d3 16608->16611 16609->16611 16616 6ce9c6c7 16609->16616 16612 6ce9c1a6 16611->16612 16613 6ce9c1b9 16612->16613 16614 6ce9c1ce 16612->16614 16613->16614 16638 6ce9ac30 16613->16638 16614->16602 16617 6ce9c6d3 __FrameHandler3::FrameUnwindToState 16616->16617 16618 6ce99497 _unexpected 39 API calls 16617->16618 16619 6ce9c6dc 16618->16619 16626 6ce9c722 16619->16626 16629 6ce997c3 EnterCriticalSection 16619->16629 16621 6ce9c6fa 16630 6ce9c748 16621->16630 16626->16611 16627 6ce98e79 __FrameHandler3::FrameUnwindToState 39 API calls 16628 6ce9c747 16627->16628 16629->16621 16631 6ce9c756 _unexpected 16630->16631 16633 6ce9c70b 16630->16633 16632 6ce9c47b _unexpected 14 API calls 16631->16632 16631->16633 16632->16633 16634 6ce9c727 16633->16634 16637 6ce9980b LeaveCriticalSection 16634->16637 16636 6ce9c71e 16636->16626 16636->16627 16637->16636 16639 6ce99497 _unexpected 39 API calls 16638->16639 16640 6ce9ac35 16639->16640 16641 6ce9ab48 ___scrt_uninitialize_crt 39 API calls 16640->16641 16642 6ce9ac40 16641->16642 16642->16614 16644 6ce9a876 GetCPInfo 16643->16644 16653 6ce9a93f 16643->16653 16649 6ce9a88e 16644->16649 16644->16653 16645 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16647 6ce9a9f1 16645->16647 16647->16579 16654 6ce9ce34 16649->16654 16652 6ce9d144 43 API calls 16652->16653 16653->16645 16655 6ce9a27e 39 API calls 16654->16655 16656 6ce9ce54 16655->16656 16674 6ce9afe2 16656->16674 16658 6ce9cf10 16660 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16658->16660 16659 6ce9cf08 16677 6ce9cf35 16659->16677 16663 6ce9a8f6 16660->16663 16661 6ce9ce81 16661->16658 16661->16659 16662 6ce9c0fa 15 API calls 16661->16662 16665 6ce9cea6 __FrameHandler3::FrameUnwindToState __alloca_probe_16 16661->16665 16662->16665 16669 6ce9d144 16663->16669 16665->16659 16666 6ce9afe2 ___scrt_uninitialize_crt MultiByteToWideChar 16665->16666 16667 6ce9ceef 16666->16667 16667->16659 16668 6ce9cef6 GetStringTypeW 16667->16668 16668->16659 16670 6ce9a27e 39 API calls 16669->16670 16671 6ce9d157 16670->16671 16683 6ce9cf55 16671->16683 16681 6ce9af4a 16674->16681 16678 6ce9cf41 16677->16678 16679 6ce9cf52 16677->16679 16678->16679 16680 6ce99be4 __freea 14 API calls 16678->16680 16679->16658 16680->16679 16682 6ce9af5b MultiByteToWideChar 16681->16682 16682->16661 16684 6ce9cf70 16683->16684 16685 6ce9afe2 ___scrt_uninitialize_crt MultiByteToWideChar 16684->16685 16689 6ce9cfb4 16685->16689 16686 6ce9d12f 16687 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16686->16687 16688 6ce9a917 16687->16688 16688->16652 16689->16686 16690 6ce9c0fa 15 API calls 16689->16690 16692 6ce9cfda __alloca_probe_16 16689->16692 16703 6ce9d082 16689->16703 16690->16692 16691 6ce9cf35 __freea 14 API calls 16691->16686 16693 6ce9afe2 ___scrt_uninitialize_crt MultiByteToWideChar 16692->16693 16692->16703 16694 6ce9d023 16693->16694 16694->16703 16711 6ce9b593 16694->16711 16697 6ce9d059 16702 6ce9b593 6 API calls 16697->16702 16697->16703 16698 6ce9d091 16699 6ce9d11a 16698->16699 16700 6ce9c0fa 15 API calls 16698->16700 16704 6ce9d0a3 __alloca_probe_16 16698->16704 16701 6ce9cf35 __freea 14 API calls 16699->16701 16700->16704 16701->16703 16702->16703 16703->16691 16704->16699 16705 6ce9b593 6 API calls 16704->16705 16706 6ce9d0e6 16705->16706 16706->16699 16717 6ce9b09c 16706->16717 16708 6ce9d100 16708->16699 16709 6ce9d109 16708->16709 16710 6ce9cf35 __freea 14 API calls 16709->16710 16710->16703 16720 6ce9b266 16711->16720 16715 6ce9b5e4 LCMapStringW 16716 6ce9b5a4 16715->16716 16716->16697 16716->16698 16716->16703 16718 6ce9b0af ___scrt_uninitialize_crt 16717->16718 16719 6ce9b0ed WideCharToMultiByte 16718->16719 16719->16708 16721 6ce9b365 _unexpected 5 API calls 16720->16721 16722 6ce9b27c 16721->16722 16722->16716 16723 6ce9b5f0 16722->16723 16726 6ce9b280 16723->16726 16725 6ce9b5fb 16725->16715 16727 6ce9b365 _unexpected 5 API calls 16726->16727 16728 6ce9b296 16727->16728 16728->16725 16729->16590 16740 6ce9ae48 16730->16740 16732 6ce9a6db 16733 6ce9ae48 29 API calls 16732->16733 16734 6ce9a6fa 16733->16734 16735 6ce9a68f 16734->16735 16736 6ce99be4 __freea 14 API calls 16734->16736 16737 6ce9a6ad 16735->16737 16736->16735 16754 6ce9980b LeaveCriticalSection 16737->16754 16739 6ce9a69b 16739->16103 16741 6ce9ae59 16740->16741 16749 6ce9ae55 __InternalCxxFrameHandler 16740->16749 16742 6ce9ae60 16741->16742 16746 6ce9ae73 __FrameHandler3::FrameUnwindToState 16741->16746 16743 6ce99b74 __dosmaperr 14 API calls 16742->16743 16744 6ce9ae65 16743->16744 16745 6ce99a93 ___std_exception_copy 29 API calls 16744->16745 16745->16749 16747 6ce9aeaa 16746->16747 16748 6ce9aea1 16746->16748 16746->16749 16747->16749 16752 6ce99b74 __dosmaperr 14 API calls 16747->16752 16750 6ce99b74 __dosmaperr 14 API calls 16748->16750 16749->16732 16751 6ce9aea6 16750->16751 16753 6ce99a93 ___std_exception_copy 29 API calls 16751->16753 16752->16751 16753->16749 16754->16739 16756 6ce98e2d 16755->16756 16757 6ce98e3b 16755->16757 16756->16757 16762 6ce98e53 16756->16762 16758 6ce99b74 __dosmaperr 14 API calls 16757->16758 16759 6ce98e43 16758->16759 16760 6ce99a93 ___std_exception_copy 29 API calls 16759->16760 16761 6ce98e4d 16760->16761 16761->16050 16762->16761 16763 6ce99b74 __dosmaperr 14 API calls 16762->16763 16763->16759 16768 6ce989ef 16764->16768 16769 6ce989c0 16764->16769 16765 6ce98a06 16767 6ce99be4 __freea 14 API calls 16765->16767 16766 6ce99be4 __freea 14 API calls 16766->16768 16767->16769 16768->16765 16768->16766 16769->16052 16770 2ef5c20 16771 2ef5c6e NtProtectVirtualMemory 16770->16771 16773 2ef5cb8 16771->16773 16774 2ef9900 16776 2ef9909 16774->16776 16775 2ef9be9 16776->16775 16780 2efa1a8 16776->16780 16784 2efa1a1 16776->16784 16788 2ef95bc 16776->16788 16781 2efa1e6 16780->16781 16792 6ce92350 16781->16792 16785 2efa1a8 16784->16785 16787 6ce92350 31 API calls 16785->16787 16786 2efa209 16786->16776 16787->16786 16789 2efa2f8 FindCloseChangeNotification 16788->16789 16791 2efa366 16789->16791 16791->16776 16809 6ce92370 __FrameHandler3::FrameUnwindToState 16792->16809 16793 6ce94288 ReadProcessMemory WriteProcessMemory 16793->16809 16795 6ce93400 WriteProcessMemory 16795->16809 16796 6ce947ca CloseHandle 16796->16809 16797 6ce9472a ReadProcessMemory WriteProcessMemory 16797->16809 16798 6ce94451 CloseHandle 16798->16809 16799 6ce93621 WriteProcessMemory 16799->16809 16800 6ce947e8 CloseHandle 16800->16809 16803 6ce9339d VirtualAllocEx 16803->16809 16804 6ce931b5 Wow64GetThreadContext 16804->16809 16805 6ce94536 CloseHandle 16805->16809 16806 6ce93fa7 WriteProcessMemory 16806->16809 16807 6ce93eaa ReadProcessMemory 16807->16809 16808 6ce93176 VirtualAlloc 16808->16809 16809->16793 16809->16795 16809->16796 16809->16797 16809->16798 16809->16799 16809->16800 16809->16803 16809->16804 16809->16805 16809->16806 16809->16807 16809->16808 16810 6ce930e6 CreateProcessW 16809->16810 16811 6ce93346 VirtualAllocEx 16809->16811 16812 6ce94606 16809->16812 16814 6ce943c1 Wow64SetThreadContext ResumeThread 16809->16814 16816 6ce945bb 16809->16816 16819 6ce91c80 16809->16819 16828 6ce91000 16809->16828 16810->16809 16811->16809 16813 6ce91c80 10 API calls 16812->16813 16815 6ce94614 ReadProcessMemory 16813->16815 16814->16809 16815->16809 16817 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16816->16817 16818 2efa209 16817->16818 16818->16776 16824 6ce91cd9 __FrameHandler3::FrameUnwindToState 16819->16824 16820 6ce91fab GetModuleHandleW GetProcAddress 16820->16824 16821 6ce91ffc NtQueryInformationProcess 16821->16824 16822 6ce92292 GetModuleHandleW GetProcAddress 16823 6ce922e3 __FrameHandler3::FrameUnwindToState 16822->16823 16823->16824 16824->16820 16824->16821 16824->16822 16825 6ce9226b 16824->16825 16826 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16825->16826 16827 6ce9227b ReadProcessMemory 16826->16827 16827->16809 16829 6ce9105f 16828->16829 16829->16829 16830 6ce950b0 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16829->16830 16831 6ce91202 16830->16831 16831->16809 16832 2ef6100 16833 2ef614b NtAllocateVirtualMemory 16832->16833 16835 2ef6192 16833->16835
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Process$Memory$AllocReadThreadVirtual$CloseContextHandleWow64Write$CreateResume
                      • String ID: 7*,x$7*,x$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D
                      • API String ID: 2880406585-1007386547
                      • Opcode ID: 030e768f68a9c71d4100fb71311fe9a99b4582fcadcc6c245d2d17a7e462fa22
                      • Instruction ID: 883b91005c0ee3733f6a8d06b095fa274b165db125db29d0945020e7a03c3017
                      • Opcode Fuzzy Hash: 030e768f68a9c71d4100fb71311fe9a99b4582fcadcc6c245d2d17a7e462fa22
                      • Instruction Fuzzy Hash: 7913D3B2A05655CFCF15CE7CC9983DD7BF1AB86319F20419AD419DBB40D33A9A898F01
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 345 6ce91c80-6ce91cd2 346 6ce91cd9-6ce91ce4 345->346 347 6ce91cea-6ce91cf7 346->347 348 6ce921b2-6ce921fb 346->348 351 6ce91cfd-6ce91d0a 347->351 352 6ce920fe-6ce9213f 347->352 349 6ce92340 348->349 349->346 354 6ce91fab-6ce9208e GetModuleHandleW GetProcAddress call 6ce95cb0 NtQueryInformationProcess 351->354 355 6ce91d10-6ce91d1d 351->355 352->349 354->349 359 6ce91ece-6ce91f29 355->359 360 6ce91d23-6ce91d30 355->360 359->349 362 6ce920ae-6ce920be 360->362 363 6ce91d36-6ce91d43 360->363 362->349 365 6ce91d49-6ce91d56 363->365 366 6ce92292-6ce92328 GetModuleHandleW GetProcAddress call 6ce95cb0 363->366 370 6ce91d5c-6ce91d69 365->370 371 6ce92144-6ce9218d 365->371 366->349 374 6ce91d6f-6ce91d7c 370->374 375 6ce92192-6ce92199 370->375 371->349 377 6ce9232d-6ce92334 374->377 378 6ce91d82-6ce91d8f 374->378 375->349 377->349 380 6ce920e9-6ce920f9 378->380 381 6ce91d95-6ce91da2 378->381 380->349 383 6ce91da8-6ce91db5 381->383 384 6ce920d5-6ce920e4 381->384 386 6ce91dbb-6ce91dc8 383->386 387 6ce92200-6ce92266 383->387 384->349 389 6ce91f5d-6ce91fa6 386->389 390 6ce91dce-6ce91ddb 386->390 387->349 389->349 392 6ce92339 390->392 393 6ce91de1-6ce91dee 390->393 392->349 395 6ce9219e-6ce921ad 393->395 396 6ce91df4-6ce91e01 393->396 395->349 398 6ce9226b-6ce92285 call 6ce950b0 396->398 399 6ce91e07-6ce91e14 396->399 402 6ce91e1a-6ce91e27 399->402 403 6ce920c3-6ce920d0 399->403 406 6ce91e2d-6ce91e3a 402->406 407 6ce91f2e-6ce91f35 402->407 403->349 409 6ce91f3a-6ce91f58 406->409 410 6ce91e40-6ce91e4d 406->410 407->349 409->349 412 6ce92093-6ce920a9 410->412 413 6ce91e53-6ce91e60 410->413 412->349 415 6ce92286-6ce9228d 413->415 416 6ce91e66-6ce91e73 413->416 415->349 418 6ce91e79-6ce91e7e 416->418 419 6ce91e83-6ce91ec9 416->419 418->349 419->349
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: NtQueryInformationProcess$ntdll.dll$KH$KH
                      • API String ID: 0-3525560144
                      • Opcode ID: 44c6abfa92e43f529184d408fa351dd8835502a1fb5a76ecfe815f0c4141e987
                      • Instruction ID: bd2cda25a1b3c5ee959219eaaf4a4cdd39da0a108d1b2682a941fcfaffcf2b5b
                      • Opcode Fuzzy Hash: 44c6abfa92e43f529184d408fa351dd8835502a1fb5a76ecfe815f0c4141e987
                      • Instruction Fuzzy Hash: 2302CC76F152059FCF08CFBCD5987DEBBF2AB5A304F208419E815EB764C635990A8B41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: $&:$&h#1$)s=B$.f28$8y4a$=~60
                      • API String ID: 0-187508944
                      • Opcode ID: 8ef391a4c7f7b5f97bccad50786590b9a1149b394f1b500bf357e492fb36b866
                      • Instruction ID: be9b3fe715afadfa5bf3ee023b268bc97dc2bb62b9d9ee074960e1c05995eba5
                      • Opcode Fuzzy Hash: 8ef391a4c7f7b5f97bccad50786590b9a1149b394f1b500bf357e492fb36b866
                      • Instruction Fuzzy Hash: 90E341B9E112298FCB68DF68C85069DB7F6BB88204F4585E9D809F7354DB31AD85CF80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: ?+"x$Hwq$pwq$pwq
                      • API String ID: 0-3500585567
                      • Opcode ID: 1df50c25937bafa1e6c94f0ac4fe9c8ac4bfa6c7cd4b2b0a250658256ad6fb55
                      • Instruction ID: 4d0cfb5bc8e92e54620b1b2694bc73d380d5a04591e36504c6ef7cc25d4e33bc
                      • Opcode Fuzzy Hash: 1df50c25937bafa1e6c94f0ac4fe9c8ac4bfa6c7cd4b2b0a250658256ad6fb55
                      • Instruction Fuzzy Hash: 53E26775B412198FCB64DFA9CCC4A99B7B2BF88304F1580A9E609EB365DB319D85CF40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1703 136e0d0-136e0e4 1704 136e0e7-136e10b call 13699c8 1703->1704 1707 136e10d-136e13e call 136ab50 1704->1707 1709 136e143-136e167 1707->1709 1711 136e1c9-136e1d5 1709->1711 1712 136e169-136e172 1709->1712 1711->1704 1714 136e1db-136e1ef 1711->1714 1712->1704 1713 136e178-136e1c8 call 1368fc0 1712->1713 1717 136e267-136e275 1714->1717 1718 136e1f1-136e259 call 1368fc0 1714->1718 1717->1704 1719 136e27b-136e28f 1717->1719 1718->1704 1747 136e25f-136e266 1718->1747 1724 136e295-136e2a3 1719->1724 1725 136e322-136e359 1719->1725 1724->1704 1727 136e2a9-136e314 call 1368fc0 1724->1727 1740 136e35b-136e366 call 1368f80 1725->1740 1727->1704 1758 136e31a-136e321 1727->1758 1748 136e39e-136e3b2 1740->1748 1749 136e368-136e371 1740->1749 1750 136e373-136e381 1748->1750 1756 136e3b4-136e3b9 1748->1756 1749->1740 1749->1750 1750->1748 1757 136e383-136e39c 1750->1757 1757->1748 1759 136e3ba-136e3d6 1757->1759
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: (osq$Hwq$\ssq$;sq
                      • API String ID: 0-3095602133
                      • Opcode ID: 3b7c1f47f8c330177e64ba9e9d2f48d4f6fe45766998669dd96fce7700f302cb
                      • Instruction ID: de9e128a394d68a30b9b1fa04a73a7c0498c60a37f6ce9950644bb32fe9a84f1
                      • Opcode Fuzzy Hash: 3b7c1f47f8c330177e64ba9e9d2f48d4f6fe45766998669dd96fce7700f302cb
                      • Instruction Fuzzy Hash: A481D236F002258FCB14EBAED8904ADFBE6BFC8214B598579D919E7394DA319C05CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq
                      • API String ID: 0-933684408
                      • Opcode ID: 7999a3b5a1cf4af4901d90797bbab0a3014957af5d6d9f785206721c7692b1c8
                      • Instruction ID: cd62a325fbb6d2804b24897a0d3f30b1da54991d3113406fd8e44836923ba264
                      • Opcode Fuzzy Hash: 7999a3b5a1cf4af4901d90797bbab0a3014957af5d6d9f785206721c7692b1c8
                      • Instruction Fuzzy Hash: 5C627775A00A068FCB54CF58C880AAEFBB2FF88314F55DA69D51A9B655D730FC42CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2063 2ef95d8-2ef9906 2067 2ef9909 2063->2067 2068 2ef990e 2067->2068 2069 2ef9918-2ef991c call 2ef9bf8 2068->2069 2070 2ef9922-2ef9952 2069->2070 2072 2ef9954-2ef9967 2070->2072 2073 2ef9972-2ef9981 2072->2073 2073->2068 2074 2ef9983-2ef9998 2073->2074 2074->2067 2076 2ef999e 2074->2076 2077 2ef99a9-2ef99b5 2076->2077 2077->2068 2078 2ef99bb-2ef99ca 2077->2078 2079 2ef99d1-2ef99d7 2078->2079 2079->2067 2080 2ef99dd-2ef99e6 call 2ef9e9a 2079->2080 2081 2ef99ec-2ef99fa 2080->2081 2081->2070 2082 2ef9a00-2ef9a0f call 2ef9598 2081->2082 2084 2ef9a14-2ef9a28 2082->2084 2084->2070 2085 2ef9a2e-2ef9a6e 2084->2085 2085->2068 2086 2ef9a74-2ef9a76 2085->2086 2087 2ef9a7c-2ef9a8d 2086->2087 2088 2ef9be9-2ef9bf0 2086->2088 2087->2068 2089 2ef9a93-2ef9aad 2087->2089 2089->2067 2090 2ef9ab3-2ef9af5 call 2ef95a4 2089->2090 2093 2ef9bdd-2ef9be3 2090->2093 2094 2ef9afb-2ef9b0f 2090->2094 2093->2068 2093->2088 2094->2067 2095 2ef9b15-2ef9b36 2094->2095 2098 2ef9b4e-2ef9b5e 2095->2098 2099 2ef9b38-2ef9b3e 2095->2099 2110 2ef9b61 call 2efa1a8 2098->2110 2111 2ef9b61 call 2efa1a1 2098->2111 2100 2ef9b42-2ef9b44 2099->2100 2101 2ef9b40 2099->2101 2100->2098 2101->2098 2102 2ef9b63-2ef9b6f 2102->2070 2103 2ef9b75-2ef9bab call 2ef95b0 2102->2103 2103->2068 2106 2ef9bb1-2ef9bbd call 2ef95bc 2103->2106 2108 2ef9bc2-2ef9bd1 2106->2108 2108->2067 2109 2ef9bd7 2108->2109 2109->2093 2110->2102 2111->2102
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4y j
                      • API String ID: 0-1036931025
                      • Opcode ID: 3c7bcd216b9f57b4b746c8caf76d48988c58beaca93f765358f5c1fb9006d13b
                      • Instruction ID: 847cab5c8d1756cda3a7014951e1d638df9b02e3a12669abe36670866642fad5
                      • Opcode Fuzzy Hash: 3c7bcd216b9f57b4b746c8caf76d48988c58beaca93f765358f5c1fb9006d13b
                      • Instruction Fuzzy Hash: AD716932F412354FC75CDB7D88502ADBBA2ABC421430B957ADD96EB3A2EA648D04C7D1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2114 1369b00-1369b2b 2115 1369b2d-1369b32 2114->2115 2116 1369b3a-1369b40 2114->2116 2115->2116 2117 1369b42-1369b5f 2116->2117 2118 1369b60-1369b91 2116->2118 2121 1369b94-1369ba6 call 1369b00 2118->2121 2124 1369ba9-1369bc9 call 1368b98 2121->2124 2128 1369bcb-1369bef 2124->2128 2131 1369bf5-1369c29 2128->2131 2131->2121 2133 1369c2f-1369c7b 2131->2133 2133->2121 2137 1369c81-1369c9d 2133->2137 2138 1369dd3-1369de3 2137->2138 2139 1369ca3-1369cdb 2137->2139 2138->2124 2140 1369de9-1369e47 call 13699c8 2138->2140 2143 1369da7-1369dad 2139->2143 2145 1369e97-1369e9d 2140->2145 2146 1369e49-1369e60 2140->2146 2143->2121 2147 1369db3-1369dc7 2143->2147 2145->2133 2150 1369ea3-1369ec4 call 13699c8 2145->2150 2148 1369e66-1369e86 2146->2148 2149 136a09a-136a0ae 2146->2149 2151 1369ce0-1369d01 call 1369b00 2147->2151 2152 1369dcd 2147->2152 2153 136a0b5-136a0ff 2148->2153 2154 1369e8c-1369e91 2148->2154 2149->2153 2150->2131 2160 1369eca-1369f04 call 1361098 call 1368cd0 2150->2160 2165 1369d03-1369d10 2151->2165 2166 1369d2a-1369d30 2151->2166 2152->2138 2154->2145 2154->2149 2177 1369f09-1369f5e 2160->2177 2165->2128 2168 1369d16-1369d24 2165->2168 2166->2131 2169 1369d36-1369da1 call 13699c8 2166->2169 2168->2166 2169->2143 2178 1369f75-1369fa8 2177->2178 2179 1369f60 2177->2179 2182 136a014 2178->2182 2183 1369faa-1369fb9 2178->2183 2181 1369fbf-1369fda 2179->2181 2185 1369f62-1369f72 2181->2185 2186 1369fdc-1369ff1 2181->2186 2188 136a019 2182->2188 2183->2181 2185->2178 2186->2185 2191 1369ff7-1369ffd 2186->2191 2188->2149 2191->2181 2192 1369fff-136a012 2191->2192 2192->2188
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: /7,q
                      • API String ID: 0-3858938213
                      • Opcode ID: 187c98319fdcc5384e3f9ee8d1ecf084f4f846df700454bf84103dd4515beb55
                      • Instruction ID: b7ca0b796f9fe2935995a5848c1f4d64e46d755eed91fdbf473c1c20b99268e0
                      • Opcode Fuzzy Hash: 187c98319fdcc5384e3f9ee8d1ecf084f4f846df700454bf84103dd4515beb55
                      • Instruction Fuzzy Hash: FBE19D71B043098FDB18DFB9D8D4A9DBBF6BF88208B658129E509EB355DB70AC45CB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2193 2ef60dd-2ef6190 NtAllocateVirtualMemory 2197 2ef6199-2ef61be 2193->2197 2198 2ef6192-2ef6198 2193->2198 2198->2197
                      APIs
                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 02EF6183
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID:
                      • API String ID: 2167126740-0
                      • Opcode ID: 2f6375db9059013267ff20764ee7999f12f43ec1f20c0d70201506a30cb06e44
                      • Instruction ID: f985f6aff9942f83316df2a45e93253303fa7a93fa21a8fe0d43287d5fd479d8
                      • Opcode Fuzzy Hash: 2f6375db9059013267ff20764ee7999f12f43ec1f20c0d70201506a30cb06e44
                      • Instruction Fuzzy Hash: 822135B1D003499FCB10CFAAC881ADEFBF5FF48320F14842AE519A7210C779A945CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2210 2ef5c20-2ef5cb6 NtProtectVirtualMemory 2213 2ef5cbf-2ef5ce4 2210->2213 2214 2ef5cb8-2ef5cbe 2210->2214 2214->2213
                      APIs
                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EF5CA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProtectVirtual
                      • String ID:
                      • API String ID: 2706961497-0
                      • Opcode ID: d8bad3d928cf4a3e62a957e7d6d45cceda5188c6a618dfd6244bb31421f2eb0e
                      • Instruction ID: 57203cb116452d453e1c10f80bc86eed7de24db5ad81733e8517b5e0bf344173
                      • Opcode Fuzzy Hash: d8bad3d928cf4a3e62a957e7d6d45cceda5188c6a618dfd6244bb31421f2eb0e
                      • Instruction Fuzzy Hash: D721D2B1D013499FCB10DFAAD985ADEFBF5FF48324F24842AE519A7250C775A900CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2202 2ef5c1f-2ef5cb6 NtProtectVirtualMemory 2205 2ef5cbf-2ef5ce4 2202->2205 2206 2ef5cb8-2ef5cbe 2202->2206 2206->2205
                      APIs
                      • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EF5CA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: MemoryProtectVirtual
                      • String ID:
                      • API String ID: 2706961497-0
                      • Opcode ID: ab789b9c431c794b7d34db97f2c87fcdbd11844b9c2f300ff34276f33f0469b0
                      • Instruction ID: 0185b574b1af32648db099cbc6ec6c2155ad8606ce8d36dba180635f5f438460
                      • Opcode Fuzzy Hash: ab789b9c431c794b7d34db97f2c87fcdbd11844b9c2f300ff34276f33f0469b0
                      • Instruction Fuzzy Hash: 7D21D4B1D013499FCB10CFAAD985ADEFBF5FF98314F24842AE519A7250C7759901CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2218 2ef6100-2ef6190 NtAllocateVirtualMemory 2221 2ef6199-2ef61be 2218->2221 2222 2ef6192-2ef6198 2218->2222 2222->2221
                      APIs
                      • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 02EF6183
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: AllocateMemoryVirtual
                      • String ID:
                      • API String ID: 2167126740-0
                      • Opcode ID: c118af1592d48d451ca74b1be52333fc10adb571991be9eed2a63ea75e6edfe5
                      • Instruction ID: 3812f55458b97bc18943f3a16bd4162e3150c795d062207e2e67a911736f886b
                      • Opcode Fuzzy Hash: c118af1592d48d451ca74b1be52333fc10adb571991be9eed2a63ea75e6edfe5
                      • Instruction Fuzzy Hash: 4521F5B5D002499FCB10DFAAC885ADEFBF5FF48324F10841AE519A7210C775A954CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 4y j
                      • API String ID: 0-1036931025
                      • Opcode ID: 1706767f27dacf225afee5377bec8d83c4bbfcbbdf6e61038185bdcd09cb5dec
                      • Instruction ID: aaacd2012313d9e8a1f53ae39b85d5ef65592d5835672e3f73418afd4b701cc7
                      • Opcode Fuzzy Hash: 1706767f27dacf225afee5377bec8d83c4bbfcbbdf6e61038185bdcd09cb5dec
                      • Instruction Fuzzy Hash: D1613633F502394B87ACDABD885426EB6E3ABC4244707943ADD56FB3A5EB60DD0487D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4721537e24891ef5f48f9b197402b49a6fadb32ce844dc273fb6d287b590c7cc
                      • Instruction ID: 3661ea91dd8cda7a9de2781a11dbf94f37e1c442cb0cfa4c5b8b4368f49e07a6
                      • Opcode Fuzzy Hash: 4721537e24891ef5f48f9b197402b49a6fadb32ce844dc273fb6d287b590c7cc
                      • Instruction Fuzzy Hash: 9E325B75E0071A8FCB18CFA8C8916AEBBF2BF88314F14852AD515B7254DB74AD85CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 816676ae119510e6aa10dc1d75dd1bb126e0569b93af1bc7915b75a62f4710c6
                      • Instruction ID: be0061dcc58d293d9c6481101e1853e3e91c4242a37b430788b47a600920596f
                      • Opcode Fuzzy Hash: 816676ae119510e6aa10dc1d75dd1bb126e0569b93af1bc7915b75a62f4710c6
                      • Instruction Fuzzy Hash: 8CC19339B105258FC719EB6CC8A852DB7EAFF8D6593098468E907DB36DDE20DC058B90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8beb4be93922ca3878959bc9f753f090e20da735e55a8cb3020f07d606a062c3
                      • Instruction ID: be9993c27b585437f8a7cd9d1576a1a59930759abb5dd5d30dfd3edc95e78a03
                      • Opcode Fuzzy Hash: 8beb4be93922ca3878959bc9f753f090e20da735e55a8cb3020f07d606a062c3
                      • Instruction Fuzzy Hash: EFB16D75E10219CFCB54DFA9C894A9DB7B2BF88304F65C1A9D909EB354DB31AD41CB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 19ec6f65edffabd63bb903edce215ff45fe8a3efdc7d4b81d69676ad2d031702
                      • Instruction ID: ae8735f051455b973ca015b770f03e1231bd7fb19b8cc843226269166a176fe9
                      • Opcode Fuzzy Hash: 19ec6f65edffabd63bb903edce215ff45fe8a3efdc7d4b81d69676ad2d031702
                      • Instruction Fuzzy Hash: EAC1EAB4E0020A8FCB58CFA8D4925AEBBF2FF88314F64812AD605E7354D7349985CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0e13f84f1230cab2d9f7848719d18f5da4eec797576b76f697a7690b1c77b86f
                      • Instruction ID: 5add2122f7104bd675e1f875970db83bf16b2f4aab1b1225a765404cfdc6f9d2
                      • Opcode Fuzzy Hash: 0e13f84f1230cab2d9f7848719d18f5da4eec797576b76f697a7690b1c77b86f
                      • Instruction Fuzzy Hash: 77713726F101258BDF299AAD489402EA5DB7BD822834AD43ADD4AEB34DDE64CC0543C1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2341b7e1e4c380fe4e7902938d6ec907ece8f47ea4e10b117c0ce927711b988f
                      • Instruction ID: 7cfa88aaf93bfabf77998f5126ff45412068c436bb2c1071afcf29cc447f7568
                      • Opcode Fuzzy Hash: 2341b7e1e4c380fe4e7902938d6ec907ece8f47ea4e10b117c0ce927711b988f
                      • Instruction Fuzzy Hash: 1C91D272E043598FCB51CFA9C8806AEBBF1AB49314F06816AD858EB351D7789C45CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 251c366b237cb4e343e93ee6ff5ce2ea053ba3838b78f88be6926bf7fd4fb417
                      • Instruction ID: 1b15332787a754fe9375ec7516c0fc4e9fc5447e72ecdc2ebcdccf336530929d
                      • Opcode Fuzzy Hash: 251c366b237cb4e343e93ee6ff5ce2ea053ba3838b78f88be6926bf7fd4fb417
                      • Instruction Fuzzy Hash: 5951F372E042294FCB15DF68C8505ADBBF2AF8831071A46AAD855FB351DA349D45CBE0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 517d223a25accd44b856d092dad746d41e22a7b7650f48da1c910528cf23424f
                      • Instruction ID: 74807dc1b833a1426a87c42114bfacd0102dd347c3ddfcf9d0a8ddbae2448481
                      • Opcode Fuzzy Hash: 517d223a25accd44b856d092dad746d41e22a7b7650f48da1c910528cf23424f
                      • Instruction Fuzzy Hash: E3518C71E402598FCB58CFA9C84069DB7B2BF89304F21C1AAE909EB354EB319D41CB80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 72e34d4b149fe4910d697a7c1ccde8bc4ccdbb71e101c5767ac5fc22fadad0a9
                      • Instruction ID: c5ea6ac454750df0aa4832082eec645ae994f73bf9d48c6e8c300abae5dc2df1
                      • Opcode Fuzzy Hash: 72e34d4b149fe4910d697a7c1ccde8bc4ccdbb71e101c5767ac5fc22fadad0a9
                      • Instruction Fuzzy Hash: 98512577F106398FDB58CEAEC8411AAF7F6AB98324B06816AD949F7344D6349D05CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d4c459886ffcfd39070c8b4a744c4e3e53c88134c6aa152d55cb2c6cf619d3f4
                      • Instruction ID: 9e45ef204ed48db2cf39e217f791e512a079ba4243313ecb4cfcb67f9057a0cd
                      • Opcode Fuzzy Hash: d4c459886ffcfd39070c8b4a744c4e3e53c88134c6aa152d55cb2c6cf619d3f4
                      • Instruction Fuzzy Hash: EF412573F105398BDB18CE9EC8411AAF7FA9BD8224B06816AD909F7744D6309D05CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a162c76ace4f785b93cc68ebe31556cdd7c79e511719f62a65293fe34491ffa
                      • Instruction ID: 78c237f0492d009d700d086ab6781b959c7f38a2fd57bab0d036435f1fcb23ee
                      • Opcode Fuzzy Hash: 2a162c76ace4f785b93cc68ebe31556cdd7c79e511719f62a65293fe34491ffa
                      • Instruction Fuzzy Hash: C6312872F106294FC758DFADD8945AAFBF6BF88614305816DD949EB328DA709D04CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1347 6ce95218-6ce9522b call 6ce95a70 1350 6ce9522d-6ce9522f 1347->1350 1351 6ce95231-6ce95253 call 6ce95660 1347->1351 1352 6ce9529a-6ce952a9 1350->1352 1355 6ce952c0-6ce952d9 call 6ce958fa call 6ce95a70 1351->1355 1356 6ce95255-6ce95298 call 6ce9572b call 6ce955e7 call 6ce95a43 call 6ce952ad call 6ce958cc call 6ce952ba 1351->1356 1367 6ce952db-6ce952e1 1355->1367 1368 6ce952ea-6ce952f1 1355->1368 1356->1352 1367->1368 1371 6ce952e3-6ce952e5 1367->1371 1372 6ce952fd-6ce95311 dllmain_raw 1368->1372 1373 6ce952f3-6ce952f6 1368->1373 1378 6ce953c3-6ce953d2 1371->1378 1376 6ce953ba-6ce953c1 1372->1376 1377 6ce95317-6ce95328 dllmain_crt_dispatch 1372->1377 1373->1372 1374 6ce952f8-6ce952fb 1373->1374 1379 6ce9532e-6ce95340 call 6ce94810 1374->1379 1376->1378 1377->1376 1377->1379 1386 6ce95369-6ce9536b 1379->1386 1387 6ce95342-6ce95344 1379->1387 1389 6ce9536d-6ce95370 1386->1389 1390 6ce95372-6ce95383 dllmain_crt_dispatch 1386->1390 1387->1386 1388 6ce95346-6ce95364 call 6ce94810 call 6ce95218 dllmain_raw 1387->1388 1388->1386 1389->1376 1389->1390 1390->1376 1392 6ce95385-6ce953b7 dllmain_raw 1390->1392 1392->1376
                      APIs
                      • __RTC_Initialize.LIBCMT ref: 6CE9525F
                      • ___scrt_uninitialize_crt.LIBCMT ref: 6CE95279
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Initialize___scrt_uninitialize_crt
                      • String ID:
                      • API String ID: 2442719207-0
                      • Opcode ID: cbb12c5f762c8426d7c52c765027db93e1bee94ae4d16ac17d05e4f65907f5ef
                      • Instruction ID: 5796f70f4d312831da2f3777a8c8f5e44c23739e3ef07fec430d92a8341156e2
                      • Opcode Fuzzy Hash: cbb12c5f762c8426d7c52c765027db93e1bee94ae4d16ac17d05e4f65907f5ef
                      • Instruction Fuzzy Hash: B941D172E07618AFCB20CF55C840BAE7B75EB46B5EF31431AE82457B44C7B049458BA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1397 6ce952c8-6ce952d9 call 6ce95a70 1400 6ce952db-6ce952e1 1397->1400 1401 6ce952ea-6ce952f1 1397->1401 1400->1401 1402 6ce952e3-6ce952e5 1400->1402 1403 6ce952fd-6ce95311 dllmain_raw 1401->1403 1404 6ce952f3-6ce952f6 1401->1404 1408 6ce953c3-6ce953d2 1402->1408 1406 6ce953ba-6ce953c1 1403->1406 1407 6ce95317-6ce95328 dllmain_crt_dispatch 1403->1407 1404->1403 1405 6ce952f8-6ce952fb 1404->1405 1409 6ce9532e-6ce95340 call 6ce94810 1405->1409 1406->1408 1407->1406 1407->1409 1412 6ce95369-6ce9536b 1409->1412 1413 6ce95342-6ce95344 1409->1413 1415 6ce9536d-6ce95370 1412->1415 1416 6ce95372-6ce95383 dllmain_crt_dispatch 1412->1416 1413->1412 1414 6ce95346-6ce95364 call 6ce94810 call 6ce95218 dllmain_raw 1413->1414 1414->1412 1415->1406 1415->1416 1416->1406 1418 6ce95385-6ce953b7 dllmain_raw 1416->1418 1418->1406
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: dllmain_raw$dllmain_crt_dispatch
                      • String ID:
                      • API String ID: 3136044242-0
                      • Opcode ID: e27acd46e83ef14273d1cc88d978a0f42e026ea0f70bdc991072e25ec6387353
                      • Instruction ID: 8bb29c9caa5d0f22ecd32ade13b2bd00d1e22845de221dc58e010f2d8e470d30
                      • Opcode Fuzzy Hash: e27acd46e83ef14273d1cc88d978a0f42e026ea0f70bdc991072e25ec6387353
                      • Instruction Fuzzy Hash: E6217172D07659ABCB218F55CC40AAF3B79EB86A9EB314319FC1557B14D3B08D418BD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1763 136ab50-136ab91 1765 136ab93-136ab9d 1763->1765 1766 136abf1-136abf5 1763->1766 1769 136aba4-136aba7 1765->1769 1770 136ab9f 1765->1770 1767 136ac16 1766->1767 1768 136abf7-136ac00 1766->1768 1773 136ac19-136ac2f 1767->1773 1771 136ac07-136ac0a 1768->1771 1772 136ac02-136ac05 1768->1772 1776 136abaf-136abd9 1769->1776 1770->1769 1774 136ac14 1771->1774 1772->1774 1775 136ac7d-136ac88 1773->1775 1774->1773 1777 136ac95-136ac9b 1775->1777 1778 136ac8a-136ac92 1775->1778 1781 136ac31-136ac4b 1776->1781 1782 136abdb-136abef 1776->1782 1777->1778 1780 136ac9d 1777->1780 1778->1777 1784 136ac9e 1780->1784 1785 136ac51-136ac7b 1781->1785 1782->1766 1782->1776 1784->1784 1785->1775
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: BC9$\;sq$\;sq
                      • API String ID: 0-2583880813
                      • Opcode ID: 92acf8b65f071ebf32fc4fb79c8728d874672b035c1c355ea3047251329f45c3
                      • Instruction ID: 27ae9870d77f4516557b97e5970bd5df82032a135503e9434a1b4510fa95e231
                      • Opcode Fuzzy Hash: 92acf8b65f071ebf32fc4fb79c8728d874672b035c1c355ea3047251329f45c3
                      • Instruction Fuzzy Hash: 0931C776F002288BDF15DB68C554BEEBBFAAB48308F158069D901F7398CE749C44DBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1787 6ce95111-6ce9511f call 6ce95a70 call 6ce9575b 1791 6ce95124-6ce95127 1787->1791 1792 6ce9512d-6ce95145 call 6ce95660 1791->1792 1793 6ce951fe 1791->1793 1797 6ce9514b-6ce9515c call 6ce956bd 1792->1797 1798 6ce95210-6ce95217 call 6ce958fa 1792->1798 1795 6ce95200-6ce9520f 1793->1795 1803 6ce951ab-6ce951b9 call 6ce951f4 1797->1803 1804 6ce9515e-6ce95180 call 6ce95a17 call 6ce955db call 6ce955ff call 6ce980d7 1797->1804 1803->1793 1809 6ce951bb-6ce951c5 call 6ce958f4 1803->1809 1804->1803 1823 6ce95182-6ce95189 call 6ce95692 1804->1823 1815 6ce951c7-6ce951d0 call 6ce9581b 1809->1815 1816 6ce951e6-6ce951ef 1809->1816 1815->1816 1822 6ce951d2-6ce951e4 1815->1822 1816->1795 1822->1816 1823->1803 1827 6ce9518b-6ce951a8 call 6ce980ac 1823->1827 1827->1803
                      APIs
                      • __RTC_Initialize.LIBCMT ref: 6CE9515E
                        • Part of subcall function 6CE955DB: InitializeSListHead.KERNEL32(6CF64430,6CE95168,6CEA6450,00000010,6CE950F9,?,?,?,6CE95321,?,00000001,?,?,00000001,?,6CEA6498), ref: 6CE955E0
                      • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CE951C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                      • String ID:
                      • API String ID: 3231365870-0
                      • Opcode ID: 744f3a4c2562657e07cb7f2e91404c7e271fd2e7f84c6ea3158f6eef53948433
                      • Instruction ID: 5988462e973bfd0ef339b8bd4709edc4c33babf7a3a9d4ea93fb02094befc442
                      • Opcode Fuzzy Hash: 744f3a4c2562657e07cb7f2e91404c7e271fd2e7f84c6ea3158f6eef53948433
                      • Instruction Fuzzy Hash: CD21AE3764B740AEEB10ABF598117DD3B719B1666FF30071DD8512BF82CB214189C7A6
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1830 6ce9b73c-6ce9b741 1831 6ce9b743-6ce9b75b 1830->1831 1832 6ce9b769-6ce9b772 1831->1832 1833 6ce9b75d-6ce9b761 1831->1833 1835 6ce9b784 1832->1835 1836 6ce9b774-6ce9b777 1832->1836 1833->1832 1834 6ce9b763-6ce9b767 1833->1834 1837 6ce9b7de-6ce9b7e2 1834->1837 1840 6ce9b786-6ce9b793 GetStdHandle 1835->1840 1838 6ce9b779-6ce9b77e 1836->1838 1839 6ce9b780-6ce9b782 1836->1839 1837->1831 1841 6ce9b7e8-6ce9b7eb 1837->1841 1838->1840 1839->1840 1842 6ce9b7c0-6ce9b7d2 1840->1842 1843 6ce9b795-6ce9b797 1840->1843 1842->1837 1845 6ce9b7d4-6ce9b7d7 1842->1845 1843->1842 1844 6ce9b799-6ce9b7a2 GetFileType 1843->1844 1844->1842 1846 6ce9b7a4-6ce9b7ad 1844->1846 1845->1837 1847 6ce9b7af-6ce9b7b3 1846->1847 1848 6ce9b7b5-6ce9b7b8 1846->1848 1847->1837 1848->1837 1849 6ce9b7ba-6ce9b7be 1848->1849 1849->1837
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 6CE9B788
                      • GetFileType.KERNELBASE(00000000), ref: 6CE9B79A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileHandleType
                      • String ID:
                      • API String ID: 3000768030-0
                      • Opcode ID: 7a9caaaf020d4138e58cc6c72f9aff75542273e93d0b5d3519d39c196fe24417
                      • Instruction ID: 947d98233617beb3d63c1c23b0c9abb5ea5af1404710742ed177ce2c9988df50
                      • Opcode Fuzzy Hash: 7a9caaaf020d4138e58cc6c72f9aff75542273e93d0b5d3519d39c196fe24417
                      • Instruction Fuzzy Hash: FC119371E047518ADB314E3E8CC87227AB5AB9727DB35271DD0B696FF1C230D5868681
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryW.KERNELBASE(00000000), ref: 02EF4B58
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: db18219eca8f27a1c35e34ab6463b236690786d5d19e4b542aecb0f12ff53c71
                      • Instruction ID: e48e9dc0a3ee03d7f5cddfbabf89dd361926ede1ca1dc4f1df5d9fdb99cf9e25
                      • Opcode Fuzzy Hash: db18219eca8f27a1c35e34ab6463b236690786d5d19e4b542aecb0f12ff53c71
                      • Instruction Fuzzy Hash: FC1112B5D0061A9BCB10CF9AD945B9EFBF8FB48324F14815AE919B7340C774A940CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2226 2ef4ae7-2ef4b32 2228 2ef4b3a-2ef4b65 LoadLibraryW 2226->2228 2229 2ef4b34-2ef4b37 2226->2229 2230 2ef4b6e-2ef4b8b 2228->2230 2231 2ef4b67-2ef4b6d 2228->2231 2229->2228 2231->2230
                      APIs
                      • LoadLibraryW.KERNELBASE(00000000), ref: 02EF4B58
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 2ebf703dafa5b535678d43f0bd6158024058df0d65442f714b59c9e88b82640b
                      • Instruction ID: 3ae5c106acf46a43cbbf1af73603e4b51514020a044644ecb6952b821c987fdc
                      • Opcode Fuzzy Hash: 2ebf703dafa5b535678d43f0bd6158024058df0d65442f714b59c9e88b82640b
                      • Instruction Fuzzy Hash: 6A1103B5D006199BCB14CF9AD545A9EFBF4FB88324F14815AD919B7240C374A941CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,00000000,-B7E9DCA0,-B4F9E68F,?,02EF9BC2), ref: 02EFA357
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: 167cf665dff0b7ccb473e53f682d1e0254043cde4d27a16e25d569451b61e0c6
                      • Instruction ID: 2f90a2cfb36272f425085c1d6b419dfd9a4d3d87f3f67e600276303bed1c8bb9
                      • Opcode Fuzzy Hash: 167cf665dff0b7ccb473e53f682d1e0254043cde4d27a16e25d569451b61e0c6
                      • Instruction Fuzzy Hash: AD1146B58006498FDB10DF9AC445BDEBBF4EB48324F24846AD528A7340C779A940CBA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,00000000,-B7E9DCA0,-B4F9E68F,?,02EF9BC2), ref: 02EFA357
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID:
                      • API String ID: 2591292051-0
                      • Opcode ID: e9642649d0e666d90ff956fcdc3e5c2bc2ec252221a35a572c60eee0ded2a9e7
                      • Instruction ID: b1b7120472f52c3ddb6bd8cbfb113808923258c66398122ccb0a48ce8471d628
                      • Opcode Fuzzy Hash: e9642649d0e666d90ff956fcdc3e5c2bc2ec252221a35a572c60eee0ded2a9e7
                      • Instruction Fuzzy Hash: EA1146B5800249CFDB10DFAAC585BEEBBF4EF88324F24846AD519A7340C779A544CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq
                      • API String ID: 0-933684408
                      • Opcode ID: 983d7e75acba2308fb7d712b83972034e11cacd7b80f0e0f6eada39e2204a817
                      • Instruction ID: c124eefee8197affbc064320656f66b53d80ceecb38ef1a6dff5aadecf1bc32b
                      • Opcode Fuzzy Hash: 983d7e75acba2308fb7d712b83972034e11cacd7b80f0e0f6eada39e2204a817
                      • Instruction Fuzzy Hash: 18414732B101320FCB5A67BD642007D6ADBEBC9679349857BE50EE7384CE254C1A03D5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: NR32
                      • API String ID: 0-151731836
                      • Opcode ID: 6b279108bb6102e33cafecec7d0b3f8ea9cfbbe319d4cb9de5c2ade7b92fedc7
                      • Instruction ID: c0d06624e277220bfec7036b4683d072d2ebef78c2771031bcedc1f375a27375
                      • Opcode Fuzzy Hash: 6b279108bb6102e33cafecec7d0b3f8ea9cfbbe319d4cb9de5c2ade7b92fedc7
                      • Instruction Fuzzy Hash: 6831C232B042658FC718DE6DD89055ABBBABFC521471A85BAD819EB259DB30EC02C7D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5f7de7aab8dae92ec56c4232dc537d002d75ecf631be47cb39b49a88a5ca7740
                      • Instruction ID: 81669b0418c7ede9d518e9b0671bab9391c47375283fc9292f841f1727dcf2ac
                      • Opcode Fuzzy Hash: 5f7de7aab8dae92ec56c4232dc537d002d75ecf631be47cb39b49a88a5ca7740
                      • Instruction Fuzzy Hash: 0A414C75B00319CFCB18CFA8C49499DBBF6BF8D314B1581A9E805AB355DB71AC46CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fc73dc95385950ace0a4773bca8483a79942fde2a9a8d9919fe83e36c660584a
                      • Instruction ID: 903609b125c80738d999f2589530ce416f6badb909786d47140488faf52395ed
                      • Opcode Fuzzy Hash: fc73dc95385950ace0a4773bca8483a79942fde2a9a8d9919fe83e36c660584a
                      • Instruction Fuzzy Hash: B5415D75A4030ACFCB18CFA8D88099DBBF6BF98314B1581A9E405AB315DB71D842CB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 598a658f9d9d8a23dc0127ad43bca8a3afbbf731f8e70a7f09851f9d627d5555
                      • Instruction ID: 194cac5b490be851e663e2dcb9c3810c0c44dc8190162ee635407be0df1d8b4e
                      • Opcode Fuzzy Hash: 598a658f9d9d8a23dc0127ad43bca8a3afbbf731f8e70a7f09851f9d627d5555
                      • Instruction Fuzzy Hash: 34417B71B00315CFCB19CFA8D49459DBBF6BF89318B1581AAE809EB755DB719C42CB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ae024d5314499fa5235c0a2d39ea1c8bdb1ac4ace0ff2a345a5439ab6c446d7
                      • Instruction ID: aeaa6433ad4d722bc94b937ed9cef7118b6e418e1788f2ddeaa8bb28ca788a82
                      • Opcode Fuzzy Hash: 8ae024d5314499fa5235c0a2d39ea1c8bdb1ac4ace0ff2a345a5439ab6c446d7
                      • Instruction Fuzzy Hash: 07418D75A00216CFCB14DF79C8949AEBBBAFF89304B518069D819EB364DB31DC41CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36796632b9699c26db3fc176aa75a93421192cfde64fbba5350caed37aba873f
                      • Instruction ID: 5c1b04f3869194cf480d2b27eee74da53c85d42cacb3eedbde422bd648d61308
                      • Opcode Fuzzy Hash: 36796632b9699c26db3fc176aa75a93421192cfde64fbba5350caed37aba873f
                      • Instruction Fuzzy Hash: A3415975A00116CFCB14DF69C89496EBBBAFF89308B518069D91AEB364DB31EC41CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: de7a9c2db651fc3bf79686659810816aaf1fe8c0fc497d1e85d32c4e26f02316
                      • Instruction ID: 8b464d2293280ae494aec92c62d5cfdb7ce523232d3b39583e8ab6d2c63b2743
                      • Opcode Fuzzy Hash: de7a9c2db651fc3bf79686659810816aaf1fe8c0fc497d1e85d32c4e26f02316
                      • Instruction Fuzzy Hash: 7231E436F002298FC714DFBDC89049DBBF6BB89214B4984BDE805EB3A5DA319C05CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aebe3ed7dc68f3e757d4f5a3c6d2c211c7685f1f731f433ffa3f1aa56b9f9454
                      • Instruction ID: d27468053fcd36b5f1665a36e09f500e0f3c3c934d3be0e53b9a79d8f5a44f93
                      • Opcode Fuzzy Hash: aebe3ed7dc68f3e757d4f5a3c6d2c211c7685f1f731f433ffa3f1aa56b9f9454
                      • Instruction Fuzzy Hash: DE11CE31F002298FD718DA7EC85095AF7AABF89218715857AE84AEB348EB35DC01C7D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9d2a68ee09a4629d824cd9294522bce88477a3fbe9a487d7276c13e6f267b316
                      • Instruction ID: f41645de2876bdcab81bea97add661bc0d1a1fdfbf9f83bc9dfc7de2e5a95346
                      • Opcode Fuzzy Hash: 9d2a68ee09a4629d824cd9294522bce88477a3fbe9a487d7276c13e6f267b316
                      • Instruction Fuzzy Hash: 70118E31F002299FD718DA6ED85095AF7AABBC82187158579D819E7308DB719C01C7D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41aa6fd4d775b004df3e19a4b91ca5e12370ce7572bf9a266739494d3839eb7f
                      • Instruction ID: a7c2b8f0889b3d07c1a812b8c4e5d79e981d31c89479990d53ad221b9224d89b
                      • Opcode Fuzzy Hash: 41aa6fd4d775b004df3e19a4b91ca5e12370ce7572bf9a266739494d3839eb7f
                      • Instruction Fuzzy Hash: 4911A036B052148FC7159F78C84146ABBA6EF9A22431940B9E805EF395D635EC01CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a849b38320dba6183ee362f571454d543bc442e27c774eb9a60e5a0d312d9f6
                      • Instruction ID: 1f2ee1fd0891dd60b01a24a7cc47d1aba810bdc1a41a8afb980b9bc689d38e8f
                      • Opcode Fuzzy Hash: 1a849b38320dba6183ee362f571454d543bc442e27c774eb9a60e5a0d312d9f6
                      • Instruction Fuzzy Hash: C6016D32610220CFC3449F78D89495977F9EF8A22431640B9E409DF371DB368C46CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47538e18bc413eaae278f46117a66f37a8fc494a96198f6ebccaf5233202d784
                      • Instruction ID: a76ba405422c63ce3dd3dcf068c770776b6b863c8e3bccba19263868b672768e
                      • Opcode Fuzzy Hash: 47538e18bc413eaae278f46117a66f37a8fc494a96198f6ebccaf5233202d784
                      • Instruction Fuzzy Hash: 45019236B102248F8B18DF6DD84545EB7A6ABD922531981B9EC09EF354D635EC01CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 82b04df67584fe4f2e19a8c37be240852a4249f5e7fa3d427bcc389b40eb8722
                      • Instruction ID: c3dee76ef7985fa149c6d2e846c7127b90d30f06ac9d02eb101965950ea20eb3
                      • Opcode Fuzzy Hash: 82b04df67584fe4f2e19a8c37be240852a4249f5e7fa3d427bcc389b40eb8722
                      • Instruction Fuzzy Hash: 1301D472B003248FC7449F6CD84449A73F5EF8922435644BDE805EB362D635CC02CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e42f0e88f6d37d01b5bfccbba799a6cab8694ba7cc1aaa4c3bf593125ec0a7c4
                      • Instruction ID: 1552f6efe6bb3b9dced450729efa9d9f8d9622e51a49a92d0d930f9d84369490
                      • Opcode Fuzzy Hash: e42f0e88f6d37d01b5bfccbba799a6cab8694ba7cc1aaa4c3bf593125ec0a7c4
                      • Instruction Fuzzy Hash: BD01F271A0E3A95FD312173A482465A7FAA6FC3254B1A04BBCD81DB293DA149C09C7E2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 64ea8220d10b5c5632cc240cc469e3bfc40d9d50d64cdb358774ea8978c70f26
                      • Instruction ID: cad1c22bfcc9d8ae376b5306808b5bbdbbbf53a41eb1e3261dec435e8fd83506
                      • Opcode Fuzzy Hash: 64ea8220d10b5c5632cc240cc469e3bfc40d9d50d64cdb358774ea8978c70f26
                      • Instruction Fuzzy Hash: AC011770501306CFC729DF74D8408AABBB6FF87319750497DE056972A4DB36A846CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b0a7b2f4ea7e356b1d3dd87b78a52f7ce4f145a7429f7750ddbc892c3f0cc5a5
                      • Instruction ID: f9339f09ba697d8c3f350ef03ab02060a98b91e4c8a8043139070ade9ce408aa
                      • Opcode Fuzzy Hash: b0a7b2f4ea7e356b1d3dd87b78a52f7ce4f145a7429f7750ddbc892c3f0cc5a5
                      • Instruction Fuzzy Hash: BBF0AF73B012298FC7049B6CD84485AB3EAEB8922839644BDE909EB361CA35DC01CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 711412f71495f4695175baddfbc7a9595e6593ea09228305645f30b1bc38116a
                      • Instruction ID: 6cfefea7ad916c97bd8b206445eb5fd70f5c007ad4713a5420ca61dc2c184b89
                      • Opcode Fuzzy Hash: 711412f71495f4695175baddfbc7a9595e6593ea09228305645f30b1bc38116a
                      • Instruction Fuzzy Hash: 51012C327106208FC754DB79D89495AB7E9EF8962935640B9E909DB375CB32DC40CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dbaef1023e77c4b5c650bd9841bd0657370f1a426e32dfe68fdf5d0da1cd63ee
                      • Instruction ID: 9d20bdc382d8c3c2b37132e36317c73acfaf5dfa415eae8c556cc494f818e925
                      • Opcode Fuzzy Hash: dbaef1023e77c4b5c650bd9841bd0657370f1a426e32dfe68fdf5d0da1cd63ee
                      • Instruction Fuzzy Hash: 4F011630601306DFC738EF79D84099AB7BAFF86219750496CE05697394DB32A805CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 65c1fbdfcd20b43f61e6f54bce004084f494b7ec0d7ffb458be0e330ecd35df4
                      • Instruction ID: a2d17bc3c4818eaf64ed0eb906fbc69b52f6a084575c107ddb161a5ce1cb262f
                      • Opcode Fuzzy Hash: 65c1fbdfcd20b43f61e6f54bce004084f494b7ec0d7ffb458be0e330ecd35df4
                      • Instruction Fuzzy Hash: 51F0C2367043119FC3299B3AA81041FB7FBEBC212831684BEC006DB3A8CA715C46CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c3d6b6047ef64d0a1c673eaf5f7c156cafdb2854d1f597ed903bf3324ef001b
                      • Instruction ID: 6c6092303d49380511fe7c8733d400ce6d40b28637f3f5896f4d32bd8f347b50
                      • Opcode Fuzzy Hash: 5c3d6b6047ef64d0a1c673eaf5f7c156cafdb2854d1f597ed903bf3324ef001b
                      • Instruction Fuzzy Hash: B2F089367043155BC728AB7EA41041FB7EFEBD511C315C56DD10A97398CD715C468B85
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 564fe51c3f6fbbf1317b47956a614c7e90c4fa84c7020ea223ee5947caf38ea0
                      • Instruction ID: afd7f141705f2b2952395cad8a070a3c79be5d8797f810756b049938065ff5d9
                      • Opcode Fuzzy Hash: 564fe51c3f6fbbf1317b47956a614c7e90c4fa84c7020ea223ee5947caf38ea0
                      • Instruction Fuzzy Hash: 82E0D8311007012FC325963DEC5085A7B69DEC6628314C979E559CB628EE64AC4A83C1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4fc16f7e9b12d8adfc1886fd04576cb4ebbc5867fab8d09cace35509a2e49d25
                      • Instruction ID: 58ba2c4deb80839fc943460db11d16308e78f4cff8e4ddedb07d791fd9987724
                      • Opcode Fuzzy Hash: 4fc16f7e9b12d8adfc1886fd04576cb4ebbc5867fab8d09cace35509a2e49d25
                      • Instruction Fuzzy Hash: ECE09230A06308EFC705CFB0D91555D7BB9EF87214B5141FAD405DB191EA301E01DB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a81920c925cf605781e7e22adcd556dbe104a5575d1f9d0587cd79e5c23421b
                      • Instruction ID: 253c505103ea1f37f7f69b4936ea49e015e12fec767b9f890361cfa92143e671
                      • Opcode Fuzzy Hash: 2a81920c925cf605781e7e22adcd556dbe104a5575d1f9d0587cd79e5c23421b
                      • Instruction Fuzzy Hash: 61D01270E01208EFC704DFA4D95565DB7BAEB8A215B504499D405DB244DA711E009B91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2b4342d6f03f43ae7f3e6007e62da7603825d4d3a85c1d14f9d97edc2ba90219
                      • Instruction ID: 5e857e98fd870dee48fb7e7399b369d79a8fc4d9fdc682a7c9e1903498d239a7
                      • Opcode Fuzzy Hash: 2b4342d6f03f43ae7f3e6007e62da7603825d4d3a85c1d14f9d97edc2ba90219
                      • Instruction Fuzzy Hash: 8DE0E238245640DFC385CB28C4988907BE0AF1A22431A90EAE009CB333C236DC42CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1143f55756a09f5e70747524647b931d80b85b55b08b2b6466ecce1d0ca0bae7
                      • Instruction ID: ead2ebb3c6689187c3695b260a175d416fcd5ecf75964e7462b05f19424d0145
                      • Opcode Fuzzy Hash: 1143f55756a09f5e70747524647b931d80b85b55b08b2b6466ecce1d0ca0bae7
                      • Instruction Fuzzy Hash: D3C001382542088F8344DB59E889C51BBE9EF88A2535A80A9E90D8B732CA31FC40CA84
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .text$@$c:\windows\system32\ntdll.dll$ntdll.dll
                      • API String ID: 0-830164916
                      • Opcode ID: 750dd6d331d7d5c9cbb46e7a985d47fa1c38b76f44c1e0ac361379545687433b
                      • Instruction ID: cb498a968c0920f6af460269999f43501f31eff98d1907719d9fa7eaa76607d1
                      • Opcode Fuzzy Hash: 750dd6d331d7d5c9cbb46e7a985d47fa1c38b76f44c1e0ac361379545687433b
                      • Instruction Fuzzy Hash: C342AAB5A04219CFDB08CFBCCA9439EBBF6BB46354F208619E415EB754E739D8099B01
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CE95906
                      • IsDebuggerPresent.KERNEL32 ref: 6CE959D2
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CE959EB
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6CE959F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: 6c5d4242f00a6b45c08ab9c7520ad8d226e5cca15d2528e71dfcc4b885aaf2f3
                      • Instruction ID: 52c88f1900b9147feac14a9b0395e75ee5daa5bf0523c7cb41dd1fb8925b9278
                      • Opcode Fuzzy Hash: 6c5d4242f00a6b45c08ab9c7520ad8d226e5cca15d2528e71dfcc4b885aaf2f3
                      • Instruction Fuzzy Hash: 8B31F8B5D02318DBDF10DFA5D9897CDBBB8AF08305F2041AAE40DAB240EB749A849F45
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CE9998F
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CE99999
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CE999A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 6612d62fb84e758bb8424fcae77dbdaadbc8d4f241819a8198b1a3100a324652
                      • Instruction ID: 0e82e1792c7dceb17877bbcb41e1e8b3d905b835a3aa33038fe6d865cdf82cd4
                      • Opcode Fuzzy Hash: 6612d62fb84e758bb8424fcae77dbdaadbc8d4f241819a8198b1a3100a324652
                      • Instruction Fuzzy Hash: C531C5749122189BCB21DF65D889BCDBBB8BF08314F6052EAE41CA7250E7709F858F54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: KydD$KydD$&e
                      • API String ID: 0-189371891
                      • Opcode ID: fbc43cf09394532b0b57af62b9ecd18249390628c8721293193575468ac2ddbf
                      • Instruction ID: 40774157fa5e848cb2af4b67bfb599d4a73ce867a1ecddb7eaab254c0ec17b79
                      • Opcode Fuzzy Hash: fbc43cf09394532b0b57af62b9ecd18249390628c8721293193575468ac2ddbf
                      • Instruction Fuzzy Hash: FF221636E415058FCF09CEBCD5A53DD7BF2AB47315F20961AE432EB7A4C62A88068F54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq$Hwq
                      • API String ID: 0-741242263
                      • Opcode ID: cb542143d7a28628fb2e5d45bd3d5018f22a7a6fe79239a94364d56b33a630f0
                      • Instruction ID: 6fd50bc41f0e1f1c5b08be8fb939e2a94c69e234af48fbbc49fba389ded7048b
                      • Opcode Fuzzy Hash: cb542143d7a28628fb2e5d45bd3d5018f22a7a6fe79239a94364d56b33a630f0
                      • Instruction Fuzzy Hash: 91B1C37AF501258FCF48DB7888905AEB7B6AFC8214709D06ADD05F7355DA389C06C790
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq$Hwq
                      • API String ID: 0-741242263
                      • Opcode ID: dae278b339a75ae423ad4be0e80475d92622b5de8d3f3705ae5f2859fe3ee228
                      • Instruction ID: 33c3b574228e07f4a1b8ee100a3fbd710c9916452cdf1ae4434f10123cafcda6
                      • Opcode Fuzzy Hash: dae278b339a75ae423ad4be0e80475d92622b5de8d3f3705ae5f2859fe3ee228
                      • Instruction Fuzzy Hash: CF615632B043658FC7599B3DD85009DBBE2EFC622871681AEE905DB751DB349C06C7D1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq$;sq
                      • API String ID: 0-1006236087
                      • Opcode ID: ff7efad86233d062dcc72454e10873d3ef3d7d919d6e26e745a5dc10bd5b0664
                      • Instruction ID: 26705f7435e344003fcce1506823c720f89cf582624d727bab812683ff295708
                      • Opcode Fuzzy Hash: ff7efad86233d062dcc72454e10873d3ef3d7d919d6e26e745a5dc10bd5b0664
                      • Instruction Fuzzy Hash: 24512636F002258FCB58DB6DC85056EB7A6AFC4214B56D1AADD09EB390DB31DC41CBD1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CEA04E0,?,?,00000008,?,?,6CEA00E3,00000000), ref: 6CEA0712
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 1d4a3dbf089116dc4467b088f96a0c95beb38844dc4993d48821b703286b7363
                      • Instruction ID: c791a43cf8590941f2374d92f09d547cea0c0cb666a4b8ecfb09e5ddca888681
                      • Opcode Fuzzy Hash: 1d4a3dbf089116dc4467b088f96a0c95beb38844dc4993d48821b703286b7363
                      • Instruction Fuzzy Hash: D0B126316106489FD715CF68C486B957BF0FF45368F358698E8AACF6A1C335E992CB40
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6CE95ACE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: 76afe76bf0b47e46378fb58294dd694564a43f0c5f1a2907a821178e9ca72ed8
                      • Instruction ID: 85486b04b48b8199529cc3d89d35760506030bb8aa5f462a25e3529e7a37893e
                      • Opcode Fuzzy Hash: 76afe76bf0b47e46378fb58294dd694564a43f0c5f1a2907a821178e9ca72ed8
                      • Instruction Fuzzy Hash: 16516AB2E12205CFEB44CF66C4917AABBF0FB4A319F20866AD925EB740D3759901CF50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf089ee9aba91ba979ecc8d3365d5132f88d0cdedee0b35cd733b83e4db641bf
                      • Instruction ID: c545d7ff137df7d1c36c786e092791058e7b7b4de6daf468a4f683a2433f39e2
                      • Opcode Fuzzy Hash: bf089ee9aba91ba979ecc8d3365d5132f88d0cdedee0b35cd733b83e4db641bf
                      • Instruction Fuzzy Hash: 0F418FB5D05218AEDB10DF69CC88AEABBB9AF45308F2442DDE45D93340DB359E848F60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: %l/W
                      • API String ID: 0-276188782
                      • Opcode ID: 78415e86ba66d30066e2cfc1411c454767f036e3fbc3f950cc8bc3c34c6e54db
                      • Instruction ID: 4da61f5c0c820375abbf1257d17c96c2dad3e295a82d7f1f2c11289a2e94d48d
                      • Opcode Fuzzy Hash: 78415e86ba66d30066e2cfc1411c454767f036e3fbc3f950cc8bc3c34c6e54db
                      • Instruction Fuzzy Hash: DBE14B72E115188FCB48CFA9CC8169DFBF3BFD8314F6A816AD119EB325DA3499058B50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: 3
                      • API String ID: 0-1842515611
                      • Opcode ID: c8663d3ff897334e838a6a2e85cd8a050bcb67547e1855cb38674f928332ccb5
                      • Instruction ID: f3d417b382d1e760447d7ae95e7125137746364bd3a1525bce22d0047237fa62
                      • Opcode Fuzzy Hash: c8663d3ff897334e838a6a2e85cd8a050bcb67547e1855cb38674f928332ccb5
                      • Instruction Fuzzy Hash: 41913575E04259AFCB48CFA9D88059EFBB2FF88314B14D5AAE525E7340D7349A52CF80
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: )[>7
                      • API String ID: 0-1710178443
                      • Opcode ID: 850e107f724f8a2e2ebddbf115a44bc29659fb972e50ff3525d82946a67d9cae
                      • Instruction ID: c6e60a1ba93cfbe660b406feb64c5a5321f5f630a3636a4003cd90784ae2574b
                      • Opcode Fuzzy Hash: 850e107f724f8a2e2ebddbf115a44bc29659fb972e50ff3525d82946a67d9cae
                      • Instruction Fuzzy Hash: A0514A73F552264BCB489BBC886016DF2D6BB9825431A957DCD2EFB392DA60DC09C3C1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: )[>7
                      • API String ID: 0-1710178443
                      • Opcode ID: 30b2a29d107f010a80a1062f46ac933504b5576310095c75c7f1e3edb60e080f
                      • Instruction ID: b361e43809cebd1eca38dcecd73252860915542f9f58b9749a41a3635ca85a1b
                      • Opcode Fuzzy Hash: 30b2a29d107f010a80a1062f46ac933504b5576310095c75c7f1e3edb60e080f
                      • Instruction Fuzzy Hash: 7A515A73F512214BCB48ABBC886016DE2D7BB9825431A957DCD2EFB392DA20DC08C3C1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID: Hwq
                      • API String ID: 0-933684408
                      • Opcode ID: 6d29102e02438998dc7149c16994d3d1751723fea2d58183d06de3b710c0677d
                      • Instruction ID: 52b5bd3303c419a407b6e6744098e3831c69a59069fd88ba90f7ed7b1cb42b92
                      • Opcode Fuzzy Hash: 6d29102e02438998dc7149c16994d3d1751723fea2d58183d06de3b710c0677d
                      • Instruction Fuzzy Hash: 0851A336F002258FCB14DBADC85496DF7FABF9825471684A9E90AEB361DA31DC05CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 6df9155d93ba4d2c1948335fba6bf06d2e9dfb37e715c03cd9449729076249b0
                      • Instruction ID: d0b5816996212680f6c57415710e008b0d47a9096ae375484d6d81007c8c10a8
                      • Opcode Fuzzy Hash: 6df9155d93ba4d2c1948335fba6bf06d2e9dfb37e715c03cd9449729076249b0
                      • Instruction Fuzzy Hash: 2521A075B101158FDB08DB7DC8916AEB7F6EFC8214B18857EE50AEB365CA34DC058780
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: HeapProcess
                      • String ID:
                      • API String ID: 54951025-0
                      • Opcode ID: ed1981de20cc926aa472f1099a3cdfca3d67f7d0cd3c050a0ab1b326fd8199b1
                      • Instruction ID: a553371dcb41847172256e2b4a6d638cb29636595e9b8187f3f03f14d5405ef7
                      • Opcode Fuzzy Hash: ed1981de20cc926aa472f1099a3cdfca3d67f7d0cd3c050a0ab1b326fd8199b1
                      • Instruction Fuzzy Hash: B7A01130B00202CF8B80CFB2820830C3AF8AA222823028028A008C0200EA2080008F00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1c52873a18391b53864e03c282cdc71ef71a8236846a226e869eb36b5d882b7e
                      • Instruction ID: 96f5e3d8b6446f793e1391df5d1f22c768f7dd0e68577d40731f2bbcf019b16c
                      • Opcode Fuzzy Hash: 1c52873a18391b53864e03c282cdc71ef71a8236846a226e869eb36b5d882b7e
                      • Instruction Fuzzy Hash: FBF1B935B453188FCB64CF69CCC8799B7F2AB88204F5980A9E609DB356EB749D85CF00
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae20a5451c3927f49a03fcdd5d234e3f08b5f168bd8429a319775b83a74e8b73
                      • Instruction ID: 1a86d59bf92fd8ae582d6ba944c566a9df7ed0129435c35fe7c3498cbf6f740c
                      • Opcode Fuzzy Hash: ae20a5451c3927f49a03fcdd5d234e3f08b5f168bd8429a319775b83a74e8b73
                      • Instruction Fuzzy Hash: 54B1D136E102298BCB05DFA8C8805AEB7B6BB48314B1A8569D91AFB355D735EC41CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4109c47bf3797fb4b5af19d7bbb689ac0ef6c4aba6d326ff78832715807c4f9
                      • Instruction ID: 585ebcceda3b146d7dec49fdb096c07165811dc8d9cc36c1dd0d4efcf69e9067
                      • Opcode Fuzzy Hash: e4109c47bf3797fb4b5af19d7bbb689ac0ef6c4aba6d326ff78832715807c4f9
                      • Instruction Fuzzy Hash: 7E91C172F002258FCB58DFB9C454559B7F2AB88314B2A85A9D80AFB354DB75DC01CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b488bc0aeb82d52bbcd337b8feeee851ed79d02669cdc07afcb3a26fb202aca1
                      • Instruction ID: 23092bd66449cb246d442d403e97d04decaed2b463823839814de2e9c519ed80
                      • Opcode Fuzzy Hash: b488bc0aeb82d52bbcd337b8feeee851ed79d02669cdc07afcb3a26fb202aca1
                      • Instruction Fuzzy Hash: FE91DF73F505298FCB58CEADC8816DEB7F2AB88214B1A816ADC19FB314D7359D058BD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5c4899e2cbd2baab71c4f29b13babc699c72abcd89ff60a8d7277fd3d49ac04f
                      • Instruction ID: 8b723513d95f7ad87a046ac772423d22e7047a964f6cabff04f11935bc2fcd65
                      • Opcode Fuzzy Hash: 5c4899e2cbd2baab71c4f29b13babc699c72abcd89ff60a8d7277fd3d49ac04f
                      • Instruction Fuzzy Hash: FE71D376F102298BDB14CAADD89069EF7FAAB84214F16816ADD05FB359DA709C41CFC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c8d05920b92d96affdc47e78dcda1710678cb87f3ce45cfbbc704c6609fd7325
                      • Instruction ID: 086fa3b005b8aa2f386682f7e7dc1addeb4cb100f3088ac7bcd0aec97e219b20
                      • Opcode Fuzzy Hash: c8d05920b92d96affdc47e78dcda1710678cb87f3ce45cfbbc704c6609fd7325
                      • Instruction Fuzzy Hash: 0E71BE72F115298FCB48CFADD8856DEB7F2AB88214B1A8169DD19FB314E7359D018BC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b214e0ecb99e9a48203d99bd95381384449536869f63c5a5f171ad1dfd6dc196
                      • Instruction ID: 221565d3dc7709ad12660feddf8d40739ce0b0e5299aed295fc188dc42315c6a
                      • Opcode Fuzzy Hash: b214e0ecb99e9a48203d99bd95381384449536869f63c5a5f171ad1dfd6dc196
                      • Instruction Fuzzy Hash: 315104B2A442458FDF04CEFDC8A17DEBBF5AB4A314F209119D825A7781C236980A8B55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6b4bfecd7eadd074f90ba6538f7d25299bcc417e0d3b0ee60ef87634cda379e1
                      • Instruction ID: db3e052d54cd3525741a84c24e96cded4be67b25df5063b0f0fb099c3295ebd0
                      • Opcode Fuzzy Hash: 6b4bfecd7eadd074f90ba6538f7d25299bcc417e0d3b0ee60ef87634cda379e1
                      • Instruction Fuzzy Hash: A5514A73F007298FDB14CE6DC8501A9FBF6AF8822470685BAD945EB755D6349C09CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a6354bd00602475c89030577230726767eed2c045871d4ac652aefbc1f766234
                      • Instruction ID: 3b3609e6f903b344b9e831d0f65af12d6660661e11478ee18a688f86500c09c0
                      • Opcode Fuzzy Hash: a6354bd00602475c89030577230726767eed2c045871d4ac652aefbc1f766234
                      • Instruction Fuzzy Hash: 5F51E272F102298F9B18CEACC88099EB7F2BB8C254756816ADE15FB350E7759C05CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f9e13d5988dc44a81bb77d6377e81e2cec846cd7fe9b57e21827df26164a6c75
                      • Instruction ID: 6b50802f21bf6fa478ca076f5bd78099227debf82a36bb42f91b1d3f90fa4a78
                      • Opcode Fuzzy Hash: f9e13d5988dc44a81bb77d6377e81e2cec846cd7fe9b57e21827df26164a6c75
                      • Instruction Fuzzy Hash: 454115B7F102264F8B54CE6CC8C05AEF7F2BB9821471A816AED15FB365DA349C058BD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0aea1b13c0d9ef7c2881d419a6de70c29d8f3dfba592aee3bdfbcdd5183a38c5
                      • Instruction ID: f8ef83a4f8cb68c7c91c7bb0bcf865b46b897574ec48eee15ce0cee6999b2ea4
                      • Opcode Fuzzy Hash: 0aea1b13c0d9ef7c2881d419a6de70c29d8f3dfba592aee3bdfbcdd5183a38c5
                      • Instruction Fuzzy Hash: C741F673F106398BDB54DE6DC8511AAB6E2AFD432070A82AAD819FB751D6748C06CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f1dd8c77c20861ea0cd562301a695eb6ac9e061435e100d6ad1689156ccf2678
                      • Instruction ID: d42e1b8deb946eb7489d36674a8140a0ce38339d57233ad7cfea276dd5c59247
                      • Opcode Fuzzy Hash: f1dd8c77c20861ea0cd562301a695eb6ac9e061435e100d6ad1689156ccf2678
                      • Instruction Fuzzy Hash: C1412673F105394BDB54DE6DC8501AAF6E7ABD432070A816ADC19FB741EA748D05CBC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9468ace41e48d49a31cf5d237cb650f7fe5007e94b18e777dd06b92e031efe73
                      • Instruction ID: e5baf6a1b2421c2d135236ae53d4f5ff633113bca695268908ca3597d295a05f
                      • Opcode Fuzzy Hash: 9468ace41e48d49a31cf5d237cb650f7fe5007e94b18e777dd06b92e031efe73
                      • Instruction Fuzzy Hash: 4F41F2B3E402298FCB14DFA9C88059EF7F6AB88654B1641AADD05FB354D3309D058BD4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: da580d698355dbaf759e2d5933d8758bb37940cfa6a1e0971efddadfb03a411c
                      • Instruction ID: 823d7d92a5599bf5fb395be69cc76f0878e1b35e8d52913be16865e6dc18bad6
                      • Opcode Fuzzy Hash: da580d698355dbaf759e2d5933d8758bb37940cfa6a1e0971efddadfb03a411c
                      • Instruction Fuzzy Hash: 5141C071F112258FCB58DF79D85446AB7F6BF8831872A84AAD806EB360DB35DC01CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9b7d0f43ae81e8f5bd1e1818e7ef8967384040e5c25e98eb2c9b87b3b2c1b78a
                      • Instruction ID: 9767a21027a344fa9d2d5d2e3d9aeddc57ba549be7777e3dccdd88a953c669e1
                      • Opcode Fuzzy Hash: 9b7d0f43ae81e8f5bd1e1818e7ef8967384040e5c25e98eb2c9b87b3b2c1b78a
                      • Instruction Fuzzy Hash: 084133B3E002388BCB14DFA9C88059EF7F6BB88640B5A41AADD05FB354D330AD048BC0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 95f7b618b9f55d193e9d7196c4d40059b925d82410c6a906b7ca2fbe06fe20b3
                      • Instruction ID: 105393cfd295873987a84dbcf1de65fa2c8be61a7cc7dc650552d184e0b984bb
                      • Opcode Fuzzy Hash: 95f7b618b9f55d193e9d7196c4d40059b925d82410c6a906b7ca2fbe06fe20b3
                      • Instruction Fuzzy Hash: 1241D276F106298F8B18DFADC8514AEB7F2BF8822471581BAD919F7361E7708C018B90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 39e2c97e0932d0326cc4a94f225a329d4e039036ea00b816e489bd72d95f53f1
                      • Instruction ID: 20df22df6362be558030e7b94273b02817ada5876e87292d8aa9ce270d7dbf43
                      • Opcode Fuzzy Hash: 39e2c97e0932d0326cc4a94f225a329d4e039036ea00b816e489bd72d95f53f1
                      • Instruction Fuzzy Hash: 85312873F106244FD744DABD88545ABB7F6ABD826471A8079DC49EB311DA74DC0287D0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010578175.0000000002EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02EF0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2ef0000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56625bbd563d72cd5fb68be9e3ca4e7a95f4f812bfe7deadd8963266de14666f
                      • Instruction ID: 9fe3521cd03c2834c23bb38bf4033545285fe4a69d7e0b6cf0f85f84573521a1
                      • Opcode Fuzzy Hash: 56625bbd563d72cd5fb68be9e3ca4e7a95f4f812bfe7deadd8963266de14666f
                      • Instruction Fuzzy Hash: 4D412576E512198FDB04CFAAC8819DEFBF5BF8C214B55816AD915BB320D7309D05CBA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e52ae92059ccb9f9340c7e91f710186469d83af7249803fcb246d3021cfa9cf9
                      • Instruction ID: a597950fe761c92c58c065b1eb8e49fd04019363dcd94bca635ac268631f44ba
                      • Opcode Fuzzy Hash: e52ae92059ccb9f9340c7e91f710186469d83af7249803fcb246d3021cfa9cf9
                      • Instruction Fuzzy Hash: 41214233B543758FD705CA298C800A5B3E2AB9162430B81BBC805EB392D935CC068B90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.2010216758.0000000001360000.00000040.00000800.00020000.00000000.sdmp, Offset: 01360000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1360000_SecuriteInfo.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 43fac49090cec7b044c2aca93c609429c64922ffd5dd880d316ab8f6d84d76f9
                      • Instruction ID: 94b217799c08b1fef60512f271c41e3534c2813f5c24a872082cd6f5973052eb
                      • Opcode Fuzzy Hash: 43fac49090cec7b044c2aca93c609429c64922ffd5dd880d316ab8f6d84d76f9
                      • Instruction Fuzzy Hash: 6D213573F102394BE704CA0ECC809AAB2DBABD462470B817AD909EB394DA71CC01CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 6CE97449
                      • ___TypeMatch.LIBVCRUNTIME ref: 6CE97557
                      • _UnwindNestedFrames.LIBCMT ref: 6CE976A9
                      • CallUnexpected.LIBVCRUNTIME ref: 6CE976C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: ,^l$csm$csm$csm
                      • API String ID: 2751267872-3279529499
                      • Opcode ID: 2b67850ab7f6f14c07e97d97224059bffcbe0a6dc5e1d1af039125ce99c6e4d0
                      • Instruction ID: a40c3cfd94ddcecf1b585c98d8c9f5ece2cfd6b94c0de2c825b8998197274302
                      • Opcode Fuzzy Hash: 2b67850ab7f6f14c07e97d97224059bffcbe0a6dc5e1d1af039125ce99c6e4d0
                      • Instruction Fuzzy Hash: 9EB17A71805209EFCF15CFA9C88099EBBB5FF05318F64415AE810ABB12D731DA69CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 6CE96407
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 6CE9640F
                      • _ValidateLocalCookies.LIBCMT ref: 6CE96498
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 6CE964C3
                      • _ValidateLocalCookies.LIBCMT ref: 6CE96518
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: aa24270637215862daa7dc24f7bab476736f1d94fe4d264efa936cafce8ec889
                      • Instruction ID: c8f61fee1013606f71d9a098b6b81223decf4f930772a79dee94a0d33b419f66
                      • Opcode Fuzzy Hash: aa24270637215862daa7dc24f7bab476736f1d94fe4d264efa936cafce8ec889
                      • Instruction Fuzzy Hash: 92418134A00254AFCF50CFA9C840A9EBBB9BF4536CF20815AD814DB751D735EA19CBD0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,6CE9B3A9,00000000,6CE98BB0,00000000,00000000,00000001,?,6CE9B522,00000022,FlsSetValue,6CEA2678,6CEA2680,00000000), ref: 6CE9B35B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: a8ed7347ba03d2148896f67ee00e013e85631b93859d18027db8cbc35b74f1f1
                      • Instruction ID: 0b7d6fa32f6e421da76275d938087e8d89ae3fd4bbebc8a5ff91e8d1d69ee4cc
                      • Opcode Fuzzy Hash: a8ed7347ba03d2148896f67ee00e013e85631b93859d18027db8cbc35b74f1f1
                      • Instruction Fuzzy Hash: F321E435E05210EFCB31DAA6DC84A5E7778EF437A8B360210ED25A7B80D770E901CAE0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetLastError.KERNEL32(00000001,?,6CE965B1,6CE956D0,6CE950E9,?,6CE95321,?,00000001,?,?,00000001,?,6CEA6498,0000000C,6CE9541A), ref: 6CE9698A
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CE96998
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CE969B1
                      • SetLastError.KERNEL32(00000000,6CE95321,?,00000001,?,?,00000001,?,6CEA6498,0000000C,6CE9541A,?,00000001,?), ref: 6CE96A03
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 066f16ac26ca3031a4f79b0254e4f7dca84eefdc2f6b71732059dd138ef780a3
                      • Instruction ID: d34f975f645ecd81935190dd5dd65f2ffdeb1582df64d48b344b2e225cc4df2d
                      • Opcode Fuzzy Hash: 066f16ac26ca3031a4f79b0254e4f7dca84eefdc2f6b71732059dd138ef780a3
                      • Instruction Fuzzy Hash: C401927371D3255EAA9016BA6C8569A3BB8DB0367C730032FE524C2BD0EB928C496284
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Strings
                      • C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe, xrefs: 6CE9A4EA
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Win32.CrypterX-gen.1582.25294.exe
                      • API String ID: 0-1594820940
                      • Opcode ID: c842b789dcf2762b1a1e7bae8f1d195f285be349e08d64c6d36aa23bd1beaa61
                      • Instruction ID: e9125fca1f9d640182e1d5bc45f7283f25f66a80f6fdfd6f39097436c5100321
                      • Opcode Fuzzy Hash: c842b789dcf2762b1a1e7bae8f1d195f285be349e08d64c6d36aa23bd1beaa61
                      • Instruction Fuzzy Hash: 92218E71B84205AFDB109F6A988099B77BDEF4636C7244628F919D7B50E734ED048BA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BA003315,00000000,?,00000000,6CEA0DE2,000000FF,?,6CE98478,?,?,6CE9844C,?), ref: 6CE98513
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CE98525
                      • FreeLibrary.KERNEL32(00000000,?,00000000,6CEA0DE2,000000FF,?,6CE98478,?,?,6CE9844C,?), ref: 6CE98547
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: f93f2f9f60222d471f29c9a86f8188b3483c6709e52f7c3f3593a51e7f7e0bb2
                      • Instruction ID: 8cfecf272463ab316c060a93fd11bb2094f0c45b1246447b4c257ad4bdfe17d7
                      • Opcode Fuzzy Hash: f93f2f9f60222d471f29c9a86f8188b3483c6709e52f7c3f3593a51e7f7e0bb2
                      • Instruction Fuzzy Hash: EF01A236A00659EFDB019FD1CC04BBEBBF8FB04758F104626E821A2B90DB34D904CA50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • __alloca_probe_16.LIBCMT ref: 6CE9CFDA
                      • __alloca_probe_16.LIBCMT ref: 6CE9D0A3
                      • __freea.LIBCMT ref: 6CE9D10A
                        • Part of subcall function 6CE9C0FA: HeapAlloc.KERNEL32(00000000,6CE9AA47,6CE9BE14,?,6CE9AA47,00000220,?,?,6CE9BE14), ref: 6CE9C12C
                      • __freea.LIBCMT ref: 6CE9D11D
                      • __freea.LIBCMT ref: 6CE9D12A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: __freea$__alloca_probe_16$AllocHeap
                      • String ID:
                      • API String ID: 1096550386-0
                      • Opcode ID: 799c4c8df98f4550090185462927bee0d90fcfd616b9b56553abaeb8bb66277e
                      • Instruction ID: 6047f2652bab03bfa5582224ef3dab2b9a4f329fd59daf4403f69e5c6c4cf7da
                      • Opcode Fuzzy Hash: 799c4c8df98f4550090185462927bee0d90fcfd616b9b56553abaeb8bb66277e
                      • Instruction Fuzzy Hash: 1951AE7B601216ABEF109F66CC81EAB3ABAEF8571CB350528FD1496B00E735CE55C660
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CE96F03,00000000,?,00000001,?,?,?,6CE96FF2,00000001,FlsFree,6CEA1D50,FlsFree), ref: 6CE96F5F
                      • GetLastError.KERNEL32(?,6CE96F03,00000000,?,00000001,?,?,?,6CE96FF2,00000001,FlsFree,6CEA1D50,FlsFree,00000000,?,6CE96A51), ref: 6CE96F69
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CE96F91
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: 89a04b1e3a1551539aceea3f973c43c434f7ee9321a61387cb83b2b92d8518ee
                      • Instruction ID: 10e8a9ee4f36f2e0bdd8d6fd7f02c2cb32eb2a174ded04365b41c26bd77d8e1c
                      • Opcode Fuzzy Hash: 89a04b1e3a1551539aceea3f973c43c434f7ee9321a61387cb83b2b92d8518ee
                      • Instruction Fuzzy Hash: 98E01A74648208FFEE101EE2EC46B4D3A7AAB01B98F264025F90DE8AD1D7A2E55099D5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetConsoleOutputCP.KERNEL32(BA003315,00000000,00000000,?), ref: 6CE9D6C5
                        • Part of subcall function 6CE9B09C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CE9D100,?,00000000,-00000008), ref: 6CE9B0FD
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CE9D917
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CE9D95D
                      • GetLastError.KERNEL32 ref: 6CE9DA00
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: 15f02acbf5b44ae3d232b57972b213e65e74091d4a0cc8d7a95888a57feb8ad7
                      • Instruction ID: 6cab9fceda8db18ea9571e2c4c9177d10f746001fe5af038f5e015abf6de9914
                      • Opcode Fuzzy Hash: 15f02acbf5b44ae3d232b57972b213e65e74091d4a0cc8d7a95888a57feb8ad7
                      • Instruction Fuzzy Hash: 4CD17DB5E052589FCF11DFA8C880AEDBBB4FF0A318F24416AE465EB741D730AA55CB50
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 5920027da90c692a466f59f2b9460a1a9d07e448b777de685a4866494f821cc5
                      • Instruction ID: 6e56d1dbcae1c55310e7b6627693035f2ef7f854631ebc1a92fb59e39054e13f
                      • Opcode Fuzzy Hash: 5920027da90c692a466f59f2b9460a1a9d07e448b777de685a4866494f821cc5
                      • Instruction Fuzzy Hash: F651B2B26056069FEB158F55D880BAA77B5FF01318F30452EEC2587B90EB31E889C7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                        • Part of subcall function 6CE9B09C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CE9D100,?,00000000,-00000008), ref: 6CE9B0FD
                      • GetLastError.KERNEL32 ref: 6CE99D4C
                      • __dosmaperr.LIBCMT ref: 6CE99D53
                      • GetLastError.KERNEL32(?,?,?,?), ref: 6CE99D8D
                      • __dosmaperr.LIBCMT ref: 6CE99D94
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: 41232824cf9b3c7f1ef5586fe35d890c85c2a99a9718eb578e8328687aad1041
                      • Instruction ID: 5eecfb7efc0e6687aadaf10eacb69f14486f1a53fd0cb1f2aba9c44f29707ed8
                      • Opcode Fuzzy Hash: 41232824cf9b3c7f1ef5586fe35d890c85c2a99a9718eb578e8328687aad1041
                      • Instruction Fuzzy Hash: 3521B071604215BFDB108FA688C099AB7BEFF4636E7248618E91DDBB20D731EC1187A0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 6CE9B147
                        • Part of subcall function 6CE9B09C: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CE9D100,?,00000000,-00000008), ref: 6CE9B0FD
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CE9B17F
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CE9B19F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: 2ce95fd0531cdcd2234248d6669e4f49dce5023884ec0aa4be83549d278974c8
                      • Instruction ID: 59d45f1efc97fcc46cfb250bfc0be52afb456ec22038b54130fdaff0766796f0
                      • Opcode Fuzzy Hash: 2ce95fd0531cdcd2234248d6669e4f49dce5023884ec0aa4be83549d278974c8
                      • Instruction Fuzzy Hash: 6D11E1B6E25255BEAB2116F75C89CAF79BCDF8A29C7300019F80591A00FB34DD0581B0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CE9E796,00000000,00000001,00000000,?,?,6CE9DA54,?,00000000,00000000), ref: 6CE9EFED
                      • GetLastError.KERNEL32(?,6CE9E796,00000000,00000001,00000000,?,?,6CE9DA54,?,00000000,00000000,?,?,?,6CE9DFF7,00000000), ref: 6CE9EFF9
                        • Part of subcall function 6CE9EFBF: CloseHandle.KERNEL32(FFFFFFFE,6CE9F009,?,6CE9E796,00000000,00000001,00000000,?,?,6CE9DA54,?,00000000,00000000,?,?), ref: 6CE9EFCF
                      • ___initconout.LIBCMT ref: 6CE9F009
                        • Part of subcall function 6CE9EF81: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CE9EFB0,6CE9E783,?,?,6CE9DA54,?,00000000,00000000,?), ref: 6CE9EF94
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CE9E796,00000000,00000001,00000000,?,?,6CE9DA54,?,00000000,00000000,?), ref: 6CE9F01E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: e30505607d183fff0be212147528ecb99f50482773d7b45dd9a8aeb97b468980
                      • Instruction ID: 63a09961ec30f687db306b0e913c91ae26039c90379152511c6f6ba3b6592a46
                      • Opcode Fuzzy Hash: e30505607d183fff0be212147528ecb99f50482773d7b45dd9a8aeb97b468980
                      • Instruction Fuzzy Hash: E9F0AC36A04664FBCF525FE6EC44ADE3F36FB0A3B5B144115FA5D96620C632C860EB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 6CE976F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2019590644.000000006CE91000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CE90000, based on PE: true
                      • Associated: 00000000.00000002.2019564193.000000006CE90000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019688250.000000006CEA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CEA8000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2019718873.000000006CF48000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2020521433.000000006CF65000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6ce90000_SecuriteInfo.jbxd
                      Yara matches
                      Similarity
                      • API ID: EncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 2118026453-2084237596
                      • Opcode ID: 56c228c9fde7e13391dbd42c905c0969df0e2f586cb8eb4cccf592690a0248ef
                      • Instruction ID: 27da64e9fbd4e09e5566ec2175df7e6c9df581395aed528fff98f8ab85a5d050
                      • Opcode Fuzzy Hash: 56c228c9fde7e13391dbd42c905c0969df0e2f586cb8eb4cccf592690a0248ef
                      • Instruction Fuzzy Hash: AC416972900209AFCF05CFA8CD81AEE7BB5FF48309F248199F914A7660E3359964DB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:17.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:21
                      Total number of Limit Nodes:1
                      execution_graph 12074 b74cb0 12075 b74ccc 12074->12075 12078 b75ec9 12075->12078 12076 b74cee 12079 b75ed7 12078->12079 12080 b75e88 12078->12080 12084 b75f09 12079->12084 12089 b75f18 12079->12089 12080->12076 12081 b75efa 12081->12076 12085 b75f34 12084->12085 12094 b7ec70 12085->12094 12098 b7ec69 12085->12098 12086 b75fd1 12086->12081 12090 b75f34 12089->12090 12092 b7ec70 GetConsoleWindow 12090->12092 12093 b7ec69 GetConsoleWindow 12090->12093 12091 b75fd1 12091->12081 12092->12091 12093->12091 12095 b7ecb1 GetConsoleWindow 12094->12095 12097 b7ecf2 12095->12097 12097->12086 12099 b7ecb1 GetConsoleWindow 12098->12099 12101 b7ecf2 12099->12101 12101->12086

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3667 b7ec69-b7ecf0 GetConsoleWindow 3670 b7ecf2-b7ecf8 3667->3670 3671 b7ecf9-b7ed39 3667->3671 3670->3671
                      APIs
                      • GetConsoleWindow.KERNELBASE ref: 00B7ECE0
                      Memory Dump Source
                      • Source File: 00000003.00000002.2019591841.0000000000B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b70000_MSBuild.jbxd
                      Similarity
                      • API ID: ConsoleWindow
                      • String ID:
                      • API String ID: 2863861424-0
                      • Opcode ID: a104ff0c3da0291a9e29ee4ffe7040df4cb45b151da33216fbe418871099a51d
                      • Instruction ID: 59fc33cdc54c36dedaf74ea783b7755754167d409289a50adabbe40e1820f6a9
                      • Opcode Fuzzy Hash: a104ff0c3da0291a9e29ee4ffe7040df4cb45b151da33216fbe418871099a51d
                      • Instruction Fuzzy Hash: 7121EAB5D012198FCB10DFA9D581ADEBBF4EF48320F24906AE429B7300C775A902CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3677 b7ec70-b7ecf0 GetConsoleWindow 3680 b7ecf2-b7ecf8 3677->3680 3681 b7ecf9-b7ed39 3677->3681 3680->3681
                      APIs
                      • GetConsoleWindow.KERNELBASE ref: 00B7ECE0
                      Memory Dump Source
                      • Source File: 00000003.00000002.2019591841.0000000000B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b70000_MSBuild.jbxd
                      Similarity
                      • API ID: ConsoleWindow
                      • String ID:
                      • API String ID: 2863861424-0
                      • Opcode ID: c9f9789ffc64a0016a7712c8fad9e3fc262c328f2cf2e88bc901e7def6793310
                      • Instruction ID: 9f926291eba9162fe94e6e764d8bfad06bcd5afe6ffe2f3ff87148b09370cf91
                      • Opcode Fuzzy Hash: c9f9789ffc64a0016a7712c8fad9e3fc262c328f2cf2e88bc901e7def6793310
                      • Instruction Fuzzy Hash: 4621D9B5D002098FCB10CFA9D585ADEBBF4EF48320F24906AE429B7300C775A901CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019255090.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b0d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b9cc7897610072d2abb01626f232e6b4b9f24997de1ecaa19550ee32fd570850
                      • Instruction ID: 00fbaf602708bd89b638e1c6680b3b13ea928cfc67e063c52b7f58bcc9cb0416
                      • Opcode Fuzzy Hash: b9cc7897610072d2abb01626f232e6b4b9f24997de1ecaa19550ee32fd570850
                      • Instruction Fuzzy Hash: 032128B1504200EFCB15DF54D9C0B26BFA5FBA8318F24C5A9ED090B2D6C336D856DBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019255090.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b0d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f0791e8a908f484307525a7e30670d4b26caed90ad21f428a921e83babacb27
                      • Instruction ID: 292c298f09487f7bded9e5f1bf225a72d10d1cec69c6039cdb4567bea06a7cd2
                      • Opcode Fuzzy Hash: 2f0791e8a908f484307525a7e30670d4b26caed90ad21f428a921e83babacb27
                      • Instruction Fuzzy Hash: B92145B1504200EFCB14DF54D9C0B26BFA6FB98320F24C5A9E9091B2D6C736D856CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019310508.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b1d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b4b07c7788be52690e988c5e604917e0ff70fa9bd30d4e98a8ce5b10980e3643
                      • Instruction ID: 329f18bdcc0d286d2f24381f7f2d63fce95988b371617a69d4bf5596c4f35907
                      • Opcode Fuzzy Hash: b4b07c7788be52690e988c5e604917e0ff70fa9bd30d4e98a8ce5b10980e3643
                      • Instruction Fuzzy Hash: CC2129B1604200EFDB05DF14D5C0B66BBE5FB84314F74CAADE9094B251C336D886CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019310508.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b1d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 40618d8f8c852ce343e06d4d0a87bde23a9499808fa89aff46fb030e568a1f40
                      • Instruction ID: 517f818778d5baa0df3d45eaad3109b2ecd639e56207523ac6f3d7825ba54f66
                      • Opcode Fuzzy Hash: 40618d8f8c852ce343e06d4d0a87bde23a9499808fa89aff46fb030e568a1f40
                      • Instruction Fuzzy Hash: 13210775504200DFCB14DF14D9D8B66BBA5FB88314F64C5ADD90A4B256C33BD887CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019310508.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b1d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a7c6dbbe3fbb890cf60bfc245cf58a6a84f52067c9df756694992d87acc25330
                      • Instruction ID: 14131ba56fb5b2c595aaf5584949bae1c23f9d3cb13dd6eade403560f39102e3
                      • Opcode Fuzzy Hash: a7c6dbbe3fbb890cf60bfc245cf58a6a84f52067c9df756694992d87acc25330
                      • Instruction Fuzzy Hash: 132165755087809FDB12CF14D994B11BFB1EB4A314F24C5DAD8498F2A7C33AD856CB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019255090.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b0d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                      • Instruction ID: 4cbc80794651143df8823eec892165109b130386415c7189ef0cfb2c87380072
                      • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                      • Instruction Fuzzy Hash: DF11E172404240CFCB16CF50D9C0B16BFB2FB94324F24C2A9DC090B296C33AD85ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019255090.0000000000B0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b0d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                      • Instruction ID: 47ea7bec2bc4d008d1e1a12f396d9e008477f5492c6fc01379c2dcb31dd0936d
                      • Opcode Fuzzy Hash: d470e05bf275f9961b8f2d54e60ae5f944f02dbb38b852c854ecf385a2209709
                      • Instruction Fuzzy Hash: 2D11B476504240DFCB16CF54D9C4B16BFB1FB94314F24C5A9DC094B696C336D456CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000003.00000002.2019310508.0000000000B1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B1D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_b1d000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                      • Instruction ID: ba395627c24037940924ad67106e1a0750635b6e7d61aa999313ac82959f230a
                      • Opcode Fuzzy Hash: 244c614e04a80719a4cbb1e35d09afbc7f52f2045db6f081cea45e42cbbeead8
                      • Instruction Fuzzy Hash: 37119D75504280DFDB16CF14D5C4B55FBB2FB84314F24C6AED8494B696C33AD88ACBA1
                      Uniqueness

                      Uniqueness Score: -1.00%